Real-Time Modelling of Distributed Component-based Applications
国际自动化与计算杂志.英文版.

国际自动化与计算杂志.英文版.1.Improved Exponential Stability Criteria for Uncertain Neutral System with Nonlinear Parameter PerturbationsFang Qiu,Ban-Tong Cui2.Robust Active Suspension Design Subject to Vehicle Inertial Parameter VariationsHai-Ping Du,Nong Zhang3.Delay-dependent Non-fragile H∞ Filtering for Uncertain Fuzzy Systems Based on Switching Fuzzy Model and Piecewise Lyapunov FunctionZhi-Le Xia,Jun-Min Li,Jiang-Rong Li4.Observer-based Adaptive Iterative Learning Control for Nonlinear Systems with Time-varying DelaysWei-Sheng Chen,Rui-Hong Li,Jing Li5.H∞ Output Feedback Control for Stochastic Systems with Mode-dependent Time-varying Delays and Markovian Jump ParametersXu-Dong Zhao,Qing-Shuang Zeng6.Delay and Its Time-derivative Dependent Robust Stability of Uncertain Neutral Systems with Saturating ActuatorsFatima El Haoussi,El Houssaine Tissir7.Parallel Fuzzy P+Fuzzy I+Fuzzy D Controller:Design and Performance EvaluationVineet Kumar,A.P.Mittal8.Observers for Descriptor Systems with Slope-restricted NonlinearitiesLin-Na Zhou,Chun-Yu Yang,Qing-Ling Zhang9.Parameterized Solution to a Class of Sylvester MatrixEquationsYu-Peng Qiao,Hong-Sheng Qi,Dai-Zhan Cheng10.Indirect Adaptive Fuzzy and Impulsive Control of Nonlinear SystemsHai-Bo Jiang11.Robust Fuzzy Tracking Control for Nonlinear Networked Control Systems with Integral Quadratic ConstraintsZhi-Sheng Chen,Yong He,Min Wu12.A Power-and Coverage-aware Clustering Scheme for Wireless Sensor NetworksLiang Xue,Xin-Ping Guan,Zhi-Xin Liu,Qing-Chao Zheng13.Guaranteed Cost Active Fault-tolerant Control of Networked Control System with Packet Dropout and Transmission DelayXiao-Yuan Luo,Mei-Jie Shang,Cai-Lian Chen,Xin-Ping Guanparison of Two Novel MRAS Based Strategies for Identifying Parameters in Permanent Magnet Synchronous MotorsKan Liu,Qiao Zhang,Zi-Qiang Zhu,Jing Zhang,An-Wen Shen,Paul Stewart15.Modeling and Analysis of Scheduling for Distributed Real-time Embedded SystemsHai-Tao Zhang,Gui-Fang Wu16.Passive Steganalysis Based on Higher Order Image Statistics of Curvelet TransformS.Geetha,Siva S.Sivatha Sindhu,N.Kamaraj17.Movement Invariants-based Algorithm for Medical Image Tilt CorrectionMei-Sen Pan,Jing-Tian Tang,Xiao-Li Yang18.Target Tracking and Obstacle Avoidance for Multi-agent SystemsJing Yan,Xin-Ping Guan,Fu-Xiao Tan19.Automatic Generation of Optimally Rigid Formations Using Decentralized MethodsRui Ren,Yu-Yan Zhang,Xiao-Yuan Luo,Shao-Bao Li20.Semi-blind Adaptive Beamforming for High-throughput Quadrature Amplitude Modulation SystemsSheng Chen,Wang Yao,Lajos Hanzo21.Throughput Analysis of IEEE 802.11 Multirate WLANs with Collision Aware Rate Adaptation AlgorithmDhanasekaran Senthilkumar,A. Krishnan22.Innovative Product Design Based on Customer Requirement Weight Calculation ModelChen-Guang Guo,Yong-Xian Liu,Shou-Ming Hou,Wei Wang23.A Service Composition Approach Based on Sequence Mining for Migrating E-learning Legacy System to SOAZhuo Zhang,Dong-Dai Zhou,Hong-Ji Yang,Shao-Chun Zhong24.Modeling of Agile Intelligent Manufacturing-oriented Production Scheduling SystemZhong-Qi Sheng,Chang-Ping Tang,Ci-Xing Lv25.Estimation of Reliability and Cost Relationship for Architecture-based SoftwareHui Guan,Wei-Ru Chen,Ning Huang,Hong-Ji Yang1.A Computer-aided Design System for Framed-mould in Autoclave ProcessingTian-Guo Jin,Feng-Yang Bi2.Wear State Recognition of Drills Based on K-means Cluster and Radial Basis Function Neural NetworkXu Yang3.The Knee Joint Design and Control of Above-knee Intelligent Bionic Leg Based on Magneto-rheological DamperHua-Long Xie,Ze-Zhong Liang,Fei Li,Li-Xin Guo4.Modeling of Pneumatic Muscle with Shape Memory Alloy and Braided SleeveBin-Rui Wang,Ying-Lian Jin,Dong Wei5.Extended Object Model for Product Configuration DesignZhi-Wei Xu,Ze-Zhong Liang,Zhong-Qi Sheng6.Analysis of Sheet Metal Extrusion Process Using Finite Element MethodXin-Cun Zhuang,Hua Xiang,Zhen Zhao7.Implementation of Enterprises' Interoperation Based on OntologyXiao-Feng Di,Yu-Shun Fan8.Path Planning Approach in Unknown EnvironmentTing-Kai Wang,Quan Dang,Pei-Yuan Pan9.Sliding Mode Variable Structure Control for Visual Servoing SystemFei Li,Hua-Long Xie10.Correlation of Direct Piezoelectric Effect on EAPap under Ambient FactorsLi-Jie Zhao,Chang-Ping Tang,Peng Gong11.XML-based Data Processing in Network Supported Collaborative DesignQi Wang,Zhong-Wei Ren,Zhong-Feng Guo12.Production Management Modelling Based on MASLi He,Zheng-Hao Wang,Ke-Long Zhang13.Experimental Tests of Autonomous Ground Vehicles with PreviewCunjia Liu,Wen-Hua Chen,John Andrews14.Modelling and Remote Control of an ExcavatorYang Liu,Mohammad Shahidul Hasan,Hong-Nian Yu15.TOPSIS with Belief Structure for Group Belief Multiple Criteria Decision MakingJiang Jiang,Ying-Wu Chen,Da-Wei Tang,Yu-Wang Chen16.Video Analysis Based on Volumetric Event DetectionJing Wang,Zhi-Jie Xu17.Improving Decision Tree Performance by Exception HandlingAppavu Alias Balamurugan Subramanian,S.Pramala,B.Rajalakshmi,Ramasamy Rajaram18.Robustness Analysis of Discrete-time Indirect Model Reference Adaptive Control with Normalized Adaptive LawsQing-Zheng Gao,Xue-Jun Xie19.A Novel Lifecycle Model for Web-based Application Development in Small and Medium EnterprisesWei Huang,Ru Li,Carsten Maple,Hong-Ji Yang,David Foskett,Vince Cleaver20.Design of a Two-dimensional Recursive Filter Using the Bees AlgorithmD. T. Pham,Ebubekir Ko(c)21.Designing Genetic Regulatory Networks Using Fuzzy Petri Nets ApproachRaed I. Hamed,Syed I. Ahson,Rafat Parveen1.State of the Art and Emerging Trends in Operations and Maintenance of Offshore Oil and Gas Production Facilities: Some Experiences and ObservationsJayantha P.Liyanage2.Statistical Safety Analysis of Maintenance Management Process of Excavator UnitsLjubisa Papic,Milorad Pantelic,Joseph Aronov,Ajit Kumar Verma3.Improving Energy and Power Efficiency Using NComputing and Approaches for Predicting Reliability of Complex Computing SystemsHoang Pham,Hoang Pham Jr.4.Running Temperature and Mechanical Stability of Grease as Maintenance Parameters of Railway BearingsJan Lundberg,Aditya Parida,Peter S(o)derholm5.Subsea Maintenance Service Delivery: Mapping Factors Influencing Scheduled Service DurationEfosa Emmanuel Uyiomendo,Tore Markeset6.A Systemic Approach to Integrated E-maintenance of Large Engineering PlantsAjit Kumar Verma,A.Srividya,P.G.Ramesh7.Authentication and Access Control in RFID Based Logistics-customs Clearance Service PlatformHui-Fang Deng,Wen Deng,Han Li,Hong-Ji Yang8.Evolutionary Trajectory Planning for an Industrial RobotR.Saravanan,S.Ramabalan,C.Balamurugan,A.Subash9.Improved Exponential Stability Criteria for Recurrent Neural Networks with Time-varying Discrete and Distributed DelaysYuan-Yuan Wu,Tao Li,Yu-Qiang Wu10.An Improved Approach to Delay-dependent Robust Stabilization for Uncertain Singular Time-delay SystemsXin Sun,Qing-Ling Zhang,Chun-Yu Yang,Zhan Su,Yong-Yun Shao11.Robust Stability of Nonlinear Plants with a Non-symmetric Prandtl-Ishlinskii Hysteresis ModelChang-An Jiang,Ming-Cong Deng,Akira Inoue12.Stability Analysis of Discrete-time Systems with Additive Time-varying DelaysXian-Ming Tang,Jin-Shou Yu13.Delay-dependent Stability Analysis for Markovian Jump Systems with Interval Time-varying-delaysXu-Dong Zhao,Qing-Shuang Zeng14.H∞ Synchronization of Chaotic Systems via Delayed Feedback ControlLi Sheng,Hui-Zhong Yang15.Adaptive Fuzzy Observer Backstepping Control for a Class of Uncertain Nonlinear Systems with Unknown Time-delayShao-Cheng Tong,Ning Sheng16.Simulation-based Optimal Design of α-β-γ-δ FilterChun-Mu Wu,Paul P.Lin,Zhen-Yu Han,Shu-Rong Li17.Independent Cycle Time Assignment for Min-max SystemsWen-De Chen,Yue-Gang Tao,Hong-Nian Yu1.An Assessment Tool for Land Reuse with Artificial Intelligence MethodDieter D. Genske,Dongbin Huang,Ariane Ruff2.Interpolation of Images Using Discrete Wavelet Transform to Simulate Image Resizing as in Human VisionRohini S. Asamwar,Kishor M. Bhurchandi,Abhay S. Gandhi3.Watermarking of Digital Images in Frequency DomainSami E. I. Baba,Lala Z. Krikor,Thawar Arif,Zyad Shaaban4.An Effective Image Retrieval Mechanism Using Family-based Spatial Consistency Filtration with Object RegionJing Sun,Ying-Jie Xing5.Robust Object Tracking under Appearance Change ConditionsQi-Cong Wang,Yuan-Hao Gong,Chen-Hui Yang,Cui-Hua Li6.A Visual Attention Model for Robot Object TrackingJin-Kui Chu,Rong-Hua Li,Qing-Ying Li,Hong-Qing Wang7.SVM-based Identification and Un-calibrated Visual Servoing for Micro-manipulationXin-Han Huang,Xiang-Jin Zeng,Min Wang8.Action Control of Soccer Robots Based on Simulated Human IntelligenceTie-Jun Li,Gui-Qiang Chen,Gui-Fang Shao9.Emotional Gait Generation for a Humanoid RobotLun Xie,Zhi-Liang Wang,Wei Wang,Guo-Chen Yu10.Cultural Algorithm for Minimization of Binary Decision Diagram and Its Application in Crosstalk Fault DetectionZhong-Liang Pan,Ling Chen,Guang-Zhao Zhang11.A Novel Fuzzy Direct Torque Control System for Three-level Inverter-fed Induction MachineShu-Xi Liu,Ming-Yu Wang,Yu-Guang Chen,Shan Li12.Statistic Learning-based Defect Detection for Twill FabricsLi-Wei Han,De Xu13.Nonsaturation Throughput Enhancement of IEEE 802.11b Distributed Coordination Function for Heterogeneous Traffic under Noisy EnvironmentDhanasekaran Senthilkumar,A. Krishnan14.Structure and Dynamics of Artificial Regulatory Networks Evolved by Segmental Duplication and Divergence ModelXiang-Hong Lin,Tian-Wen Zhang15.Random Fuzzy Chance-constrained Programming Based on Adaptive Chaos Quantum Honey Bee Algorithm and Robustness AnalysisHan Xue,Xun Li,Hong-Xu Ma16.A Bit-level Text Compression Scheme Based on the ACW AlgorithmHussein A1-Bahadili,Shakir M. Hussain17.A Note on an Economic Lot-sizing Problem with Perishable Inventory and Economies of Scale Costs:Approximation Solutions and Worst Case AnalysisQing-Guo Bai,Yu-Zhong Zhang,Guang-Long Dong1.Virtual Reality: A State-of-the-Art SurveyNing-Ning Zhou,Yu-Long Deng2.Real-time Virtual Environment Signal Extraction and DenoisingUsing Programmable Graphics HardwareYang Su,Zhi-Jie Xu,Xiang-Qian Jiang3.Effective Virtual Reality Based Building Navigation Using Dynamic Loading and Path OptimizationQing-Jin Peng,Xiu-Mei Kang,Ting-Ting Zhao4.The Skin Deformation of a 3D Virtual HumanXiao-Jing Zhou,Zheng-Xu Zhao5.Technology for Simulating Crowd Evacuation BehaviorsWen-Hu Qin,Guo-Hui Su,Xiao-Na Li6.Research on Modelling Digital Paper-cut PreservationXiao-Fen Wang,Ying-Rui Liu,Wen-Sheng Zhang7.On Problems of Multicomponent System Maintenance ModellingTomasz Nowakowski,Sylwia Werbinka8.Soft Sensing Modelling Based on Optimal Selection of Secondary Variables and Its ApplicationQi Li,Cheng Shao9.Adaptive Fuzzy Dynamic Surface Control for Uncertain Nonlinear SystemsXiao-Yuan Luo,Zhi-Hao Zhu,Xin-Ping Guan10.Output Feedback for Stochastic Nonlinear Systems with Unmeasurable Inverse DynamicsXin Yu,Na Duan11.Kalman Filtering with Partial Markovian Packet LossesBao-Feng Wang,Ge Guo12.A Modified Projection Method for Linear FeasibilityProblemsYi-Ju Wang,Hong-Yu Zhang13.A Neuro-genetic Based Short-term Forecasting Framework for Network Intrusion Prediction SystemSiva S. Sivatha Sindhu,S. Geetha,M. Marikannan,A. Kannan14.New Delay-dependent Global Asymptotic Stability Condition for Hopfield Neural Networks with Time-varying DelaysGuang-Deng Zong,Jia Liu hHTTp://15.Crosscumulants Based Approaches for the Structure Identification of Volterra ModelsHouda Mathlouthi,Kamel Abederrahim,Faouzi Msahli,Gerard Favier1.Coalition Formation in Weighted Simple-majority Games under Proportional Payoff Allocation RulesZhi-Gang Cao,Xiao-Guang Yang2.Stability Analysis for Recurrent Neural Networks with Time-varying DelayYuan-Yuan Wu,Yu-Qiang Wu3.A New Type of Solution Method for the Generalized Linear Complementarity Problem over a Polyhedral ConeHong-Chun Sun,Yan-Liang Dong4.An Improved Control Algorithm for High-order Nonlinear Systems with Unmodelled DynamicsNa Duan,Fu-Nian Hu,Xin Yu5.Controller Design of High Order Nonholonomic System with Nonlinear DriftsXiu-Yun Zheng,Yu-Qiang Wu6.Directional Filter for SAR Images Based on NonsubsampledContourlet Transform and Immune Clonal SelectionXiao-Hui Yang,Li-Cheng Jiao,Deng-Feng Li7.Text Extraction and Enhancement of Binary Images Using Cellular AutomataG. Sahoo,Tapas Kumar,B.L. Rains,C.M. Bhatia8.GH2 Control for Uncertain Discrete-time-delay Fuzzy Systems Based on a Switching Fuzzy Model and Piecewise Lyapunov FunctionZhi-Le Xia,Jun-Min Li9.A New Energy Optimal Control Scheme for a Separately Excited DC Motor Based Incremental Motion DriveMilan A.Sheta,Vivek Agarwal,Paluri S.V.Nataraj10.Nonlinear Backstepping Ship Course ControllerAnna Witkowska,Roman Smierzchalski11.A New Method of Embedded Fourth Order with Four Stages to Study Raster CNN SimulationR. Ponalagusamy,S. Senthilkumar12.A Minimum-energy Path-preserving Topology Control Algorithm for Wireless Sensor NetworksJin-Zhao Lin,Xian Zhou,Yun Li13.Synchronization and Exponential Estimates of Complex Networks with Mixed Time-varying Coupling DelaysYang Dai,YunZe Cai,Xiao-Ming Xu14.Step-coordination Algorithm of Traffic Control Based on Multi-agent SystemHai-Tao Zhang,Fang Yu,Wen Li15.A Research of the Employment Problem on Common Job-seekersand GraduatesBai-Da Qu。
A Survey of Cyber-Physical Systems

A Survey of Cyber-Physical SystemsJiafu Wan a,ba School of Computer Science and EngineeringSouth China University of Technology,Guangzhou,Chinajiafuwan_76@Hehua Yan*,b,Hui Suo bb College of Information EngineeringGuangdong Jidian PolytechnicGuangzhou,China*Corresponding Author,hehua_yan@Abstract—Cyber Physical Systems(CPSs)are characterized by integrating computation and physical processes.The theories and applications of CPSs face the enormous challenges.The aim of this work is to provide a better understanding of this emerging multi-disciplinary methodology.First,the features of CPSs are described,and the research progresses are summarized from different perspectives such as energy control,secure control, transmission and management,control technique,system resource allocation,and model-based software design.Then three classic applications are given to show that the prospects of CPSs are engaging.Finally,the research challenges and some suggestions for future work are in brief outlined.Keywords-cyber physical systems(CPSs);communications; computation;controlI.I NTRODUCTIONCyber Physical Systems(CPSs)integrate the dynamics of the physical processes with those of the software and communication,providing abstractions and modeling,design, and analysis techniques for the integrated whole[1].The dynamics among computers,networking,and physical systems interact in ways that require fundamentally new design technologies.The technology depends on the multi-disciplines such as embedded systems,computers,communications,etc. and the software is embedded in devices whose principle mission is not computation alone,e.g.cars,medical devices, scientific instruments,and intelligent transportation systems[2]. Now the project for CPSs engages the related researchers very much.Since2006,the National Science Foundation(NSF)has awarded large amounts of funds to a research project for CPSs. Many universities and institutes(e.g.UCB,Vanderbilt, Memphis,Michigan,Notre Dame,Maryland,and General Motors Research and Development Center,etc.)join this research project[3,4].Besides these,the researchers from other countries have started to be aware of significance for CPSs research.In[5-7],the researchers are interested in this domain,including theoretical foundations,design and implementation,real-world applications,as well as education. As a whole,although the researchers have made some progress in modeling,control of energy and security,approach of software design,etc.the CPSs are just in an embryonic stage.The rest of this paper is outlined as follows.Section II introduces the features of CPSs.From different perspectives, the research processes are summarized in Section III.Section IV gives some classic applications.Section V outlines the research challenges and some suggestions for future work and Section VI concludes this paper.II.F EATURES OF CPS SGoals of CPSs research program are to deeply integrate physical and cyber design.The diagrammatic layout for CPSs is shown in Figure1.Obviously,CPSs are different from desktop computing,traditional embedded/real-time systems, today’s wireless sensor network(WSN),etc.and they have some defining characteristics as follows[7-10].∙Closely integrated.CPSs are the integrations of computation and physical processes.∙Cyber capability in every physical component and resource-constrained.The software is embedded inevery embedded system or physical component,andthe system resources such as computing,networkbandwidth,etc.are usually limited.∙Networked at multiple and extreme scales.CPSs,the networks of which include wired/wireless network,WLAN,Bluetooth,GSM,etc.are distributed systems.Moreover,the system scales and device categoriesappear to be highly varied.∙Complex at multiple temporal and spatial scales.In CPSs,the different component has probablyinequable Figure1.Diagrammatic layout for CPSsgranularity of time and spatiality,and CPSs are strictlyconstrained by spatiality and real time.∙Dynamically reorganizing/reconfiguring.CPSs as very complicated systems must have adaptive capabilities.∙High degrees of automation,control loops must close.CPSs are in favor of convenient man-machineinteraction,and the advanced feedback controltechnologies are widely applied to these systems.∙Operation must be dependable,certified in some cases.As a large scale/complicated system,the reliability andsecurity are necessary for CPSs.III.R EASEARCH P ROCESSSince2007,American government has treated CPSs as a new development strategy.Some researchers from various countries discussed the related concepts,technologies, applications and challenges during CPSweek and the international conference on CPS subject[11].The results of this research mainly concentrate in the following respects[7]. A.Energy ControlOne of the features of CPSs is distributed system.Though the vast majority of devices in CPSs need less energy,the energy supply is still a great challenge because the demand and supply of energy is inconvenient.In[12],a control strategy is proposed for realizing best trade-off between satisfying user requests and energy consumption in a data center.In[13-15],these papers concern the basic modeling of cyber-based physical energy systems.A novel cyber-based dynamic model is proposed in which a resulting mathematical model greatly depends on the cyber technologies supporting the physical system.F.M.Zhang et al [16]design optimal and adaptive discharge profile for a square wave impulsive current to achieve maximum battery life.J. Wei et al and C.J.Xue et al[17,18]develop an optimal lazy scheduler to manage services with minimum energy expenditure while not violating time-sensitive constraints.In [19],a peak inlet temperature minimization problem is formulated to improve the energy efficiency.J.R.Cao et al[20] present a clustering architecture in order to obtain good performance in energy efficiency.B.Secure ControlNow,the research for secure control mainly includes key management,identity authentication,etc.In[21],the existing security technologies for CPSs are summarized,and main challenges are proposed.C.Singh et al[22]explore the topic of the reliability assurance of CPSs and possibly stimulate more research in this area.T.T.Gamage et al[23]give a general theory of event compensation as an information flow security enforcement mechanism for CPSs.Then a case study is used to demonstrate this concept.In[24],a certifcateless signature scheme for mobile wireless CPSs is designed and validated.Y.Zhang et al[25]present an adaptive health monitoring and management system model that defines the fault diagnosis quality metrics and supports diagnosis requirement specifications.J.Wei et al[26]exploit message scheduling solutions to improve security quality of wireless networks for mission-critical cyber-physical applications.C.Transmission and ManagementCPSs need to conduct the transmission and management of multi-modal data generated by different sensor devices.In[27], a novel information-centric approach for timely,secure real-time data services in CPSs is proposed.In order to obtain the crucial data for optimal environment abstraction,L.H.Kong et al[28]study the spatio-temporal distribution of CPS nodes.H. Ahmadi et al[29]present an innovative congestion control mechanism for accurate estimation of spatio-temporal phenomena in wireless sensor networks performing monitoring applications.A dissertation on CPSs discusses the design, implementation,and evaluation of systems and algorithms that enable predictable and scalable real-time data services for CPS applications[30].Now,the exiting results are still rare,and there are many facets to be studied.D.Model-based Software DesignNow,the main model-based software design methods include Model Driven Development(MDD)(e.g.UML), Model-Integrated Computing(MIC),Domain-Specific Modeling(DSM),etc[31,32].An example,abstractions in the design flow for DSM,is shown in Figure2.These methods have been widely applied to the embedded system design[34, 35].On the basis of these,some researchers conduct model-based software design for CPSs in the following aspects:event model,physical model,reliability and real-time assurance,etc.Figure2.Abstractions in the design flow for DSM[33]1)Event model.E.A.Lee et al[36]make a case that the time is right to introduce temporal semantics into programming models for CPSs.A programming model called programming temporally-integrated distributed embedded systems(PTIDES) provides a coordination language rooted in discrete-event semantics,supported by a lightweight runtime framework and tools for verifying concurrent software components.In[37],a concept lattice-based event model for CPSs is proposed.This model not only captures the essential information about events in a distributed and heterogeneous environment,but it alsoPlatform mapping Abstractions are linkedthrough refinementrelationsAbstraction layers allowthe verification ofdifferent propertiesPlatform mappingAbstraction layersdefine platformsallows events to be composed across different boundaries of different components and devices within and among both cyber and physical domains.In addition,A CPS architecture along with a novel event model for CPS is developed[38].2)Physical model.In[39],a methodology for automatically abstracting models of CPSs is proposed.The models are described using a user-defined language inspired by assembly code.For mechanical systems,Y.Zhu et al[40]show how analytical models of a particular class of physical systems can be automatically mapped to executable simulation codes.S.Jha et al[41]present a new approach to assist designers by synthesizing the switching logic,given a partial system model, using a combination of fixpoint computation,numerical simulation,and machine learning.This technique quickly generates intuitive system models.3)Reliability and real-time assurance. E. A.Lee[42] emphasizes the importance of security,reliability and real-time assurance in CPSs,and considers the effective orchestration of software and physical processes requires semantic models. From the perspective of soft real-time and hard real-time,U. Kremer[43]conducts the research that the role of time in CPS applications has a fundamental impact on the design and requirements.In CPSs,the heterogeneity causes major challenges for compositional design of large-scale systems including fundamental problems caused by network uncertainties,such as time-varying delay,jitter,data rate limitations,packet loss and others.To address these implementation uncertainties,X.Koutsoukos et al[44]propose a passive control architecture.For improving reliability,T.L. Crenshaw et al[45]describe a simplex reference model to assist developers with CPS architectures which limit fault-propagation.A highly configurable and reusable middleware framework for real-time hybrid testing is provided in[46].Though the model-based software design has an early start, the present development of CPSs progresses at a fast enough rate to provide a competitive challenge.E.Control TechniqueCompared with other control applications,the control technique for CPSs is still at an elementary stage.F.M.Zhang et al[2]develop theoretical results in designing scheduling algorithms for control applications of CPS to achieve balances among robustness,schedulability and power consumption. Moreover,an inverted pendulum as a study object is designed to validate the proposed theory.N.Kottenstette et al[47] describe a general technique:passivity and a particular controller structure involving the resilient power junction.In [48],a design and implementation of CPSs for neutrally controlled artificial legs is proposed.In[49],J.L.Ny et al approach the problem of certifying a digital controller implementation from an input-output,robust control perspective.F.System Resource AllocationUntil now,the relative research for system resource allocation mainly focuses on embedded/real-time systems, networked control systems,WSN,etc[50-52].Towards the complicated CPSs,this work is in the beginning stage.V.Liberatore[53]gives a new train of thought on bandwidth allocation in CPSs.In[54],the model dynamics are presented to express the properties of both software and hardware of CPSs,which is used to do resource allocation.K.W.Li et al [55]research the problem of designing a distributed algorithm for joint optimal congestion control and channel assignment in the multi-radio multi-channel networks for CPSs.The ductility metric is developed to characterize the overload behavior of mixed-criticality CPSs in[56].IV.C LASSIC A PPLICATIONSApplications of CPSs include medical devices and systems, assisted living,traffic control and safety,advanced automotive systems,process control,energy conservation,environmental control avionics and aviation software,instrumentation,critical infrastructure(e.g.power,water),distributed robotics,weapons systems,manufacturing,distributed sensing command and control,smart structures,biosystems,communications systems, etc.[9,10].The classic application architecture of CPSs is described in[38].Now,some application cases for CPSs have been conducted in[57-64].Here,three examples(Health Care and Medicine,Intelligent Road and Unmanned Vehicle,and Electric Power Grid)are used to illuminate the classic applications of CPSs[8,9].A.Health Care and MedicineThe domain of health care and medicine includes national health information network,electronic patient record initiative, home care,operating room,etc.some of which are increasingly controlled by computer systems with hardware and software components,and are real-time systems with safety and timing requirements.A case of CPSs,an operating room,is shown in Figure3.Figure3.A case of CPSs:An operating room[8,9]B.Electric Power GridThe power electronics,power grid,and embedded control software form a CPS,whose design is heavily influenced by fault tolerance,security,decentralized control,and economic/ ethical social aspects[65].In[8,9],a case of CPSs,electric power grid,is given as shown in Figure4.Figure4.A case of CPSs:Electric power grid[8,9]C.Integrate Intelligent Road with Unmanned VehicleWith the development of sensor network,embedded systems,etc.some new solutions can be applied to unmanned vehicle.We are conducting a program that intelligent road and unmanned vehicle are integrated in the form of CPSs.Figure5 shows another case of CPSs:Integrate intelligent road with unmanned vehicle.Figure5.A case of CPSs:Integrate intelligent road with unmanned vehicleV.R ESEARCH C HALLENGESCPSs as a very active research field,a variety of questions need to be solved,at different layers of the architecture and from different aspects of systems design,to trigger and to ease the integration of the physical and cyber worlds[66].In[10, 42,66-68],the research challenges are mainly summarized as follows:1)Control and hybrid systems.A new mathematical theory must merge event-based systems with time-based systems for feedback control.This theory also must be suitable for hierarchies involving asynchronous dynamics at different time scales and geographic scope.2)Sensor and mobile networks.In practical applications, the need for increased system autonomy requires self-organizing/reorganizing mobile networks for CPSs.Gathering and refining critical information from the vast amount of raw data is essential.3)Robustness,reliability,safety,and security.It is a critical challenge because uncertainty in the environment,security attacks,and errors in physical devices make ensuring overall system robustness,security,and safety.Exploiting the physical nature of CPS by leveraging location-based,time-based and tag-based mechanisms is to realize security solutions.4)Abstractions.This aspect includes real-time embedded systems abstractions and computational abstractions,which needs new resource allocation scheme to ensure that fault tolerance,scalability,optimization,etc.are achieved.New distributed real-time computing and real-time group communication methods are needed.In addition,the physical properties also should be captured by programming abstractions.5)Model-based development.Though there several existing model-based development methods,they are far from meeting demands in puting and communications,and physical dynamics must be abstracted and modeled at different levels of scale,locality,and time granularity.6)Verification,validation,and certification.The interaction between formal methods and testing needs to be established. We should apply the heterogeneous nature of CPS models to compositional verification and testing methods.VI.C ONCLUSIONSIn the last few years,this emerging domain for CPSs has been attracting the significant interest,and will continue for the years to come.In spite of rapid evolution,we are still facing new difficulties and severe challenges.In this literature, we concisely review the existing research results that involve energy control,secure control,model-based software design transmission and management,control technique,etc.On this basis,some classic applications used to show the good prospects.Then,we propose several research issues and encourage more insight into this new field.A CKNOWLEDGMENTThe authors would like to thank the National Natural Science Foundation of China(No.50875090,50905063), National863Project(No.2009AA4Z111),Key Science and Technology Program of Guangdong Province(No. 2010B010700015),China Postdoctoral Science Foundation (No.20090460769)and Open Foundation of Guangdong Key Laboratoryof Modern Manufacturing Technology(No. GAMTK201002)for their support in this research.R EFERENCES[1]Available at:/cps/.[2] F.M.Zhang,K.Szwaykowska,W.Wolf,and V.Mooney,“Taskscheduling for control oriented requirements for Cyber-Physical Systems,”in Proc.of2008Real-Time Systems Symposium,2005,pp.47-56.[3]Available at:/news/17248-nsf-funds-cyber-physical-systems-project/.[4]J.Sprinkle,U.Arizona,and S.S.Sastry,“CHESS:Building a Cyber-Physical Agenda on solid foundations,”Presentation Report,Apr2008.[5]Available at:/.[6]Available at:/gdcps.html.[7]J.Z.Li,H.Gao,and B.Yu,“Concepts,features,challenges,andresearch progresses of CPSs,”Development Report of China Computer Science in2009,pp.1-17.[8]R.Rajkumar,“CPS briefing,”Carnegie Mellon University,May2007.[9] B.H.Krogh,“Cyber Physical Systems:the need for new models anddesign paradigms,”Presentation Report,Carnegie Mellon University. [10] B.X.Huang,“Cyber Physical Systems:A survey,”Presentation Report,Jun2008.[11]Available at:/.[12]L.Parolini,N.Toliaz,B.Sinopoli,and B.H.Krogh,“A Cyber-PhysicalSystems approach to energy management in data centers,”in Proc.of First International Conference on Cyber-Physical Systems.April2010, Stockholm,Sweden.[13] F.M.Zhang,Z.W.Shi,and W.Wolf,“A dynamic battery model forco-design in cyber-physical systems,”in Proc.of29th IEEE International Conference on Distributed Computing Systems Workshops.2009.[14]M.D.Ilić,L.Xie,U.A.Khan,et al.“Modeling Future Cyber-PhysicalEnergy Systems,”in Proc.of Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the21st Century,2008.[15]M.D.Ilić,L.Xie,U.A.Khan,et al.“Modeling of future Cyber–Physical Energy Systems for distributed sensing and control,”IEEE Transactions on Systems,Man,and Cybernetics-Part A:Systems and Humans,Vol.40,2010,pp.825-838.[16] F.M.Zhang,and Z.W.Shi,“Optimal and adaptive battery dischargestrategies for Cyber-Physical Systems,”in Proc.of Joint48th IEEE Conference on Decision and Control,and28th Chinese Control Conference,2009,Shanghai,China.[17]W.Jiang,G.Z.Xiong,and X.Y.Ding,“Energy-saving servicescheduling for low-end Cyber-Physical Systems,”in Proc.of The9th International Conference for Young Computer Scientists,2008.[18] C.J.Xue,G.L.Xing,Z.H.Yuan,et al.“Joint sleep scheduling andmode assignment in Wireless Cyber-Physical Systems,”in Proc.of29th IEEE International Conference on Distributed Computing Systems Workshops,2009.[19]Q.H.Tang,S.K.S.Gupta,and G.Varsamopoulos,“Energy-efficientthermal-aware task scheduling for homogeneous high-performance computing data centers:A cyber-physical approach,”IEEE Transactions on Parallel and Distributed Systems,Vol.19,2008,pp.1458-1472. [20]J.R.Cao,and H.A.Li,“Energy-efficient structuralized clustering forsensor-based Cyber Physical Systems,”in Proc.of Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing,2009. [21] A. A.Cárdenas,S.Amin,and S.Sastry,“Secure control:towardssurvivable Cyber-Physical Systems,”in Proc.of The28th International Conference on Distributed Computing Systems Workshops,2008. [22] C.Singh,and A.Sprintson,“Reliability assurance of Cyber-PhysicalPower Systems,”in Conference Proc.,2010.[23]T.T.Gamage,B.M.McMillin,and T.P.Roth,“Enforcing informationflow security properties in Cyber-Physical Systems:A generalized framework based on compensation,”in Proc.of34th Annual IEEE Computer Software and Applications Conference Workshops,2010. [24]Z.Xu,X.Liu,G.Q.Z,et al.“A cert ificateless signature scheme formobile wireless Cyber-Physical Systems,”in Proc.of The28th International Conference on Distributed Computing Systems Workshops, 2008.[25]Y.Zhang,I.L.Yen,F.B.Bastani,et al.“Optimal adaptive systemhealth monitoring and diagnosis for resource constrained Cyber-Physical Systems,”in Proc.of20th International Symposium on Software Reliability Engineering,2009.[26]W.Jiang,W.H.Guo,and N.Sang,“Periodic real-time messagescheduling for confidentiality-aware Cyber-Physical System in wireless networks,”in Proc.of Fifth International Conference on Frontier of Computer Science and Technology,2010.[27]K.D.Kang,and S.H.Son,“Real-time data services for Cyber PhysicalSystems,”in Proc.of28th International Conference on Distributed Computing Systems Workshops,2008.[28]L.H.Kong,D.W.Jiang,and M.Y.Wu,“Optimizing the spatio-temporal distribution of Cyber-Physical Systems for environment abstraction,”in Proc.of International Conference on Distributed Computing Systems,2010.[29]H.Ahmadi,T.F.Abdelzaher,and I.Gupta,“Congestion control forspatio-temporal data in Cyber-Physical Systems,”in Proc.of the1st ACM/IEEE International Conference on Cyber-Physical Systems,2010.[30]W.Kang,“Adaptive real-time data management for Cyber-PhysicalSystems,”PhD Thesis,University of Virginia,2009.[31]Z.M.Song,“Devlopment method of embedded equipment controlsystems based on Model Integrated Computing,”PhD Thesis,South China University of Technology,2007.[32]Available at:/research/MIC.[33]J.Sztipanovits,“Cyber Physical Systems:New challenges for model-based design,”Presentation Report,Vanderbilt University,Apr2008. [34] F.Li,D.Li,J.F.Wan,et al.“Towards a component-based modelintegration approach for embedded computer control system,”in Proc.of International Conference on Computational Intelligence and Security, 2008.[35] D.Li,F.Li,and X.Huang,et al.“A model based integration frameworkfor computer numerical control system development,”Robotics and Computer-Integrated Manufacturing,Vol.26,2010,pp.848-860. [36] E.A.Lee,S.Matic,S.A.Seshia,et al.“The case for timing-centricdistributed software,”in Proc.of29th IEEE International Conference on Distributed Computing Systems Workshops,2009.[37]Y.Tan,M.C.Vuran,and S.Goddard,“A concept lattice-based eventmodel for Cyber-Physical Systems,”in Proc.of CCPS,Apr2010, Stockholm,Sweden.[38]Y.Tan,M.C.Vuran,and S.Goddard,“Spatio-temporal event model forCyber-Physical Systems,”in Proc.of29th IEEE International Conference on Distributed Computing Systems Workshops,2009. [39]R.A.Thacker,K.R.Jones,C.J.Myers,et al.“Automatic abstractionfor verification of Cyber-Physical Systems,”in Proc.of CCPS,Apr2010, Stockholm,Sweden.[40]Y.Zhu, E.Westbrook,J.Inoue,et al.“Mathematical equations asexecutable models of mechanical systems,”in Proc.of CCPS,Apr2010, Stockholm,Sweden.[41]S.Jha,S.Gulwani,S.A.Seshia,et al.“Synthesizing switching logic forsafety and dwell-time requirements,”in Proc.of CCPS,Apr2010, Stockholm,Sweden.[42] E.A.Lee,“Cyber Physical Systems:Design challenges,”in Proc.ofISORC,May,2008,Orlando,USA.[43]U.Kremer,“Cyber-Physical Systems:A case for soft real-time,”Available at:/.[44]X.Koutsoukos,N.Kottenstette,J.Hall,et al.“Passivity-based controldesign for Cyber-Physical Systems,”Available at:http://citeseerx.ist./.[45]T.L.Crenshaw, E.Gunter, C.L.Robinson,et al.“The simplexreference model:Limiting fault-propagation due to unreliable components in Cyber-Physical System architectures,”in Proc.of IEEE International Real-Time Systems Symposium,2008.[46]T.Tidwell,X.Y.Gao,H.M.Huang,et al.“Towards configurable real-time hybrid structural testing:A Cyber-Physical Systems approach,”in Proc.of IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing,2009.[47]N.Kottenstette,G.Karsai,and J.Sztipanovits,“A passivity-basedframework for resilient Cyber Physical Systems,”in Proc.of2nd International Symposium on Resilient Control Systems,2009.[48]H.Huang,Y.Sun,Q.Yang,et al.“Integrating neuromuscular and CyberSystems for neural control of artificial legs,”in Proc.of CCPS,Apr 2010,Stockholm,Sweden.[49]J.L.Ny,and G.J.Pappas,“Robustness analysis for the certification ofdigital controller implementations,”in Proc.of CCPS,Apr2010, Stockholm,Sweden.[50]J.F.Wan,D.Li,and P.Zhang,“Key technology of embedded systemimplementation for software-based CNC system,”Chinese Journal of Mechanical Engineering,Vol.23,2010,pp.241-248.[51]J.F.Wan,D.Li,H.H.Yan,and P.Zhang,“Fuzzy feedback schedulingalgorithm based on central processing unit utilization for a software-based computer numerical control system,”Journal of Engineering Manufacture,Vol.224,2010,pp.1133-1143.[52]J.F.Wan,and D.Li,“Fuzzy feedback scheduling algorithm based onoutput jitter in resource-constrained embedded systems,”In Proc.of International Conference on Challenges in Environmental Science and Computer Engineering,March2010,Wuhan,China.[53]V.Liberatore,“Bandwidth allocation in sense-and-respond systems,”Report,Available at:/~vxl11/NetBots/.[54]M.Lindberg,and K.E.Årzén,“Feedback control of cyber-physicalsystems with multi resource dependencies and model uncertainties,”in Proc.of the31st IEEE Real-Time Systems Symposium,Dec2010. [55]K.W.Li,Q.W.Liu,F.R.Wang,et al.“Joint optimal congestioncontrol and channel assignment for multi-radio multi-channel wireless networks in Cyber-Physical Systems,”in Proc.of Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing,2009. [56]kshmanan,D.Niz,R.Rajkumar,et al.“Resource allocation indistributed mixed-criticality Cyber-Physical Systems,”in Proc.of International Conference on Distributed Computing Systems,2010. [57] D.Dragomirescu,“Cyber-Physical Systems for aeronautic applications,”Presentation Report,2010,University of Toulouse,France.[58] A.M.K.Cheng,“Cyber-Physical Medical and Medication Systems,”inProc.of the28th International Conference on Distributed Computing Systems Workshops,2008.[59]T.Dillon,and E.Chang,“Cyber-Physical Systems as an embodiment ofdigital ecosystems,”in Proc.of4th IEEE International Conference on Digital Ecosystems and Technologies,2010.[60]J.Madden,B.McMillin,and A.Sinha,“Environmental obfuscation of aCyber Physical System-Vehicle example,”in Proc.of34th Annual IEEE Computer Software and Applications Conference Workshops,2010. [61]I.Lee,and O.Sokolsky,“Medical Cyber Physical Systems,”in Proc.ofDAC,2010,Anaheim,California,USA.[62]W.Harrison,J.Moyne,and D.Tilbury,“Virtual fusion:The completeintegration of simulated and actual,”Presentation Report,2008, University of Michigan,USA.[63]M.Li,Y.H.Liu,J.L.Wang,et al.“Sensor network navigation withoutlocations,”in Proc.of IEEE INFOCOM,2009.[64]G.L.Xing,W.J.Jia,Y.F.Du,et al.“Toward ubiquitous video-basedCyber-Physical Systems,”in Proc.of IEEE International Conference on Systems,Man and Cybernetics,2008.[65] B.McMillin,C.Gill,M.L.Crow,et al,“Cyber-Physical Systemsdistributed control-The advanced electric power grid,”Available at: /.[66]L.Sha,S.Gopalakrishnan,X.Liu,et al.“Cyber-Physical Systems:Anew frontier,”in Proc.of IEEE International Conference on Sensor Networks,Ubiquitous,and Trustworthy Computing,2008.[67]M.Broy,“Cyber-Physical Systems:Technological&scientificchallenges,”Presentation Report,2010.[68]R.Rajkumar,I.Lee,L.Sha,et al.“Cyber-Physical Systems-The nextcomputing revolution,”in Proc.of Design Automation Conference,2010, Anaheim,California,USA.。
Exstream Cloud Edition 20.2 产品介绍说明书

Exstream Cloud Edition Product overview(CE) 20.2Modernize and facilitate digital transformation with a newcloud-native version of Exstream TM.Running in the cloud comes with its own benefits such as: 1. Scalability - Scale dynamically without affecting the entire application – easily add more resources / computing power when needed 2. Security - Isolate applications in separate containers, important for GDPR, HIPAA, PCI and other data privacy requirements 3. Portability - No need to worry that an application needs to be updated when the underlying infrastructure changes Accelerate access to new innovations With container-based deployment and operations using Docker, containers managed by the industry-standard Kubernetes framework, companies can quickly and regularly deploy new functionality and versions, get up and running with cloud-based enterprise CCM, or just simplify their upgrades to take advantage of latest features also on premise.Streamlined user experience Role-based access for communication design, authoring, configuration, and orchestration through a fully web-based and harmonized user experience, for improved user productivity.Cloud-optimized enterprise CCM Multi-cloud capable and multi-tenant CCM enable taking advantage of cloud-based elastic scaling with a microservices-based architecture. Enterprise-class CCM for companies of all sizes, without compromising on Enterprise grade design and production capabilities and Exstream’s well known market leading performance.Faster time to market from creation to design Take design and authoring to the next level for business users – Enable all communication key personas to get the job done quicker, from web-based data mapping and definition, through improved visual comparison of content changes and integrated mobile design experience allowing to create true omni-channel communication experiences faster.Exstream CE is a new version of Exstream that has been built for the cloud. It not like other CCM solutions that are available int he cloud, many of which are not cloud native. Exstream is unique because:• Exstream CE is the only solution that delivers high-volume batch transactional communications in the cloud - not limited by production engine capabiltiies • True enterprise-class CCM in the cloud – design, authoring orchestration • Exstream CE is the only multi-cloud solution – pick the cloud of your choice – whether private, hybrid, hyperscaler or other • Exstream CE leverages API-enabled microservices for easily building new functionality into CCM apps, connect to any systems multiple • Exstream CE supports elastic scaling – scale up or down depending on your need for faster processing • Exstream CE future proofs CCM – Leverages leading cloud technology like Kubernetes and Docker to future proof your investment Exstream CE is sold on transactional licensing model based on usage/consumption - allowing fully utilized cloud scalability. Optimized for cloud deployment, Exstream CE delivers web-based design, composition, interactive editing, and orchestration based on the Exstream, a market-leading CCM solution. Cloud-based design and authoring available (based on numberDecomposed into individually deployablecontainers that represent a robustmicroservices architecture that can take full advantage of cloud elastic scale features and REST API based access methods.of users) through cloud edition (CE) versions of Communications Designer, Content Author,and Empower. Features include:Rapid data source and data mapping creation.Streamlined UX Unified, cloud-based user interface for communication design, authoring and orchestration Simple to install and deploy Get up and running in minutes whether on prem or cloud install Simplified data mapping for business users Manage common data sets and mapping for all communications and easily manage changes and revision of data configurations Omnichannel design Design for any channel in the browser with mobile design and see real-time simulation of communication in mobile, web, email and print Communication flow modelling Centrally manage all communication flows and approvals in web-based environment Optimized for Cloud – any cloudMulti-tenant, but also runs on premise, as long as customer run Kubernetes Central access to all communications assets, versioning and workflow. From fonts, to rich media all managed in the multi-tenant capable Distributed Asset Service in Exstream CE.Fully web-based orchestration configuration and control with new cloud connectors forAWS S3 as well as controls for timed delivery and routing.Design for any channel with real-timesimulation and web-baseddesign experienceAbout OpenTextOpenT ext, The Information Company, enables organizations to gain insight through marketleading information management solutions, on-premises or in the cloud. For more informationabout OpenT ext (NASDAQ: OTEX, TSX: OTEX) visit: .Connect with us:• OpenT ext CEO Mark Barrenechea’s blog• Twitter | LinkedIn/contact Twitter | LinkedIn。
会议分级(学校)

计算机学科国际会议分级说明:本列表合并了UCLA、NUS、NTU、CCF、清华大学计算机系、上海交大计算机系认可的国际会议,分级时采用了“就高”的原则。
Rank #1(1) AAAI: AAAI Conference on Artificial IntelligenceRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(2) CCS: ACM Conf on Comp and Communications SecurityRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(3) CRYPTO: International Cryptology ConferenceRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(4) CVPR: IEEE Conf on Comp Vision and Pattern RecognitionRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(5) FOCS: IEEE Symp on Foundations of Computer ScienceRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(6) HPCA: IEEE Symp on High-Perf Comp ArchitectureRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(7) ICCV: International Conf on Computer VisionRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(8) ICDE: Intl Conf on Data EngineeringRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(9) ICML: Intl Conf on Machine LearningRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(10) ICSE: Intl Conf on Software EngineeringRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(11) IJCAI: International Joint Conference on Artificial IntelligenceRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(12) INFOCOM: Annual Joint Conf IEEE Comp & Comm SocRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(13) ISCA: ACM/IEEE Symp on Computer ArchitectureRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(14) MICRO: Intl Symp on MicroarchitectureRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(15) MOBICOM: ACM Intl Conf on Mobile Computing and NetworkingRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(16) OOPSLA: OO Programming Systems, Languages and ApplicationsRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(17) POPL: ACM-SIGACT Symp on Principles of Prog LangsRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(18) SIGCOMM: ACM Conf on Comm Architectures, Protocols & AppsRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(19) SIGGRAPH: ACM SIGGRAPH ConferenceRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(20) SIGMOD: ACM SIGMOD Conf on Management of DataRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(21) STOC: ACM Symp on Theory of ComputingRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(22) VLDB: Very Large Data BasesRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(23) ACL: Annual Meeting of the Association for Computational LinguisticsRefs: UCLA(1) CCF(2) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(24) ACM-MM: ACM Multimedia ConferenceRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(2) NUS(1)(25) NIPS: Annual Conference on Neural Information Processing SystemsRefs: UCLA(1) CCF(2) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(26) PLDI: ACM SIGPLAN Symposium on Programming Language Design & Implementation Refs: UCLA(1) CCF(2) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(27) S&P: IEEE Symposium on Security and PrivacyRefs: UCLA(1) CCF(1) NTU(1) SJTU(1) TSINGHUA(2) NUS(1)(28) SIGMETRICS: ACM Conf on Meas. & Modelling of Comp SysRefs: UCLA(1) CCF(2) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(29) WWW: International World Wide Web ConferenceRefs: UCLA(1) CCF(2) NTU(1) SJTU(1) TSINGHUA(1) NUS(1)(30) FSE: ACM Conf on the Foundations of Software EngineeringRefs: UCLA(1) CCF(1) NTU(1) TSINGHUA(1) NUS(1)(31) ICDCS: International Conference on Distributed Computing SystemsRefs: UCLA(2) CCF(2) NTU(1) SJTU(1) TSINGHUA(2) NUS(1)(32) LICS: IEEE Symp on Logic in Computer ScienceRefs: UCLA(1) CCF(2) NTU(1) SJTU(1) TSINGHUA(2) NUS(1)(33) ASPLOS: Architectural Support for Programming Languages and Operating Systems Refs: UCLA(1) CCF(2) NTU(1) TSINGHUA(1) NUS(1)(34) COLT: Annual Conference on Computational Learning TheoryRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(1) NUS(1)(35) PODS: ACM SIGMOD Conf on Principles of DB SystemsRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(1) NUS(1)(36) PPoPP: Principles and Practice of Parallel ProgrammingRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(1) NUS(1)(37) SIGIR: ACM SIGIR Conf on Information RetrievalRefs: UCLA(1) CCF(2) NTU(1) SJTU(1) TSINGHUA(1)(38) SODA: ACM/SIAM Symp on Discrete AlgorithmsRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(1) NUS(1)(39) UAI: Conference on Uncertainty in AIRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(1) NUS(1)(40) DAC: Design Automation ConfRefs: UCLA(1) NTU(1) TSINGHUA(1) NUS(1)(41) KDD: Knowledge Discovery and Data MiningRefs: UCLA(1) NTU(1) TSINGHUA(1) NUS(1)(42) SOSP: ACM SIGOPS Symp on OS PrinciplesRefs: UCLA(1) NTU(1) TSINGHUA(1) NUS(1)(43) ICALP: International Colloquium on Automata, Languages and ProgrammingRefs: UCLA(2) CCF(2) NTU(2) SJTU(1) TSINGHUA(2) NUS(2)(44) IPDPS: Intl Parallel and Dist Processing SympRefs: UCLA(2) CCF(2) NTU(2) SJTU(1) TSINGHUA(3) NUS(2)(45) AAMAS: Intl Conf on Autonomous Agents and Multi-Agent SystemsRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(3) NUS(1)(46) CAV: Computer Aided VerificationRefs: UCLA(1) CCF(3) NTU(1) TSINGHUA(2) NUS(1)(47) FM/FME: Formal Methods, World Congress/EuropeRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(3) NUS(1)(48) I3DG: ACM-SIGRAPH Interactive 3D GraphicsRefs: UCLA(1) CCF(3) NTU(1) TSINGHUA(2) NUS(1)(49) ICDT: Intl Conf on Database TheoryRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(50) ICFP: Intl Conf on Function ProgrammingRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(51) ICNP: Intl Conf on Network ProtocolsRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(52) JICSLP/ICLP/ILPS: Joint Intl Conf/Symp on Logic ProgRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(53) KR: International Conference on Principles of Knowledge Representation and Reasoning Refs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(54) PACT: International Conference on Parallel Architectures and Compilation Techniques Refs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(55) RTSS: IEEE Real-Time Systems SymposiumRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(56) SPAA: ACM Symp on Parallel Algorithms and ArchitecturesRefs: UCLA(1) CCF(2) NTU(1) TSINGHUA(2) NUS(1)(57) DCC: Data Compression ConfRefs: UCLA(1) NTU(1) TSINGHUA(3) NUS(1)(58) ICCAD: Intl Conf on Computer-Aided DesignRefs: UCLA(1) NTU(1) TSINGHUA(2) NUS(1)(59) ISSAC: Intl Symp on Symbolic and Algebraic ComputationRefs: UCLA(1) NTU(1) TSINGHUA(3) NUS(1)(60) PODC: ACM Symp on Principles of Distributed ComputingRefs: UCLA(1) NTU(1) TSINGHUA(2) NUS(1)(61) SCG: ACM Symp on Computational GeometryRefs: UCLA(1) CCF(2) NTU(1) NUS(1)(62) PECCS: IFIP Intl Conf on Perf Eval of Comp & Comm SysRefs: UCLA(1) NTU(1) NUS(1)(63) SOSDI: Usenix Symp on OS Design and ImplementationRefs: UCLA(1) NTU(1) NUS(1)(64) CIKM: Intl Conf on Information and Knowledge ManagementRefs: UCLA(2) CCF(2) NTU(1) TSINGHUA(2) NUS(2)(65) RECOMB: Annual Intl Conf on Comp Molecular BiologyRefs: UCLA(2) NTU(1) TSINGHUA(2) NUS(1)(66) RTAS: IEEE Real-Time and Embedded Technology and Applications SymposiumRefs: CCF(3) NTU(1) TSINGHUA(2) NUS(1)(67) ISMB: International Conference on Intelligent Systems for Molecular BiologyRefs: NTU(1) TSINGHUA(2) NUS(1)(68) OSDI: Symposium on Operation systems design and implementationRefs: SJTU(1) TSINGHUA(1)(69) SIGKDD: ACM Conf on Knowledge Discovery and Data MiningRefs: CCF(1) SJTU(1)(70) EUROCRYPT: European Conf on CryptographyRefs: UCLA(1) CCF(2) NTU(2) TSINGHUA(2) NUS(2)(71) MOBIHOC: ACM International Symposium on Mobile Ad Hoc Networking and Computing Refs: UCLA(1) CCF(2) TSINGHUA(2)(72) FAST: Conference on File and Storage TechnologiesRefs: CCF(2) TSINGHUA(1)(73) NSDI: Symposium on Network System Design and Implementation Refs: CCF(2) TSINGHUA(1)(74) SC: IEEE/ACM Conference on SupercomputingRefs: SJTU(1) TSINGHUA(2)(75) USENIX Symp on Internet Tech and SysRefs: UCLA(2) NTU(1)(76) MassPar: Symp on Frontiers of Massively Parallel ProcRefs: UCLA(1)(77) OPENARCH: IEEE Conf on Open Arch and Network ProgRefs: UCLA(1)(78) SIGCHI: ACM SIG CHIRefs: CCF(1)(79) Ubicomp: International Conference on Ubiquitous Computing Refs: TSINGHUA(1)Rank #2(80) COLING: International Conference on Computational LinguisticsRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(2) NUS(2)(81) CONCUR: International Conference on Concurrency TheoryRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(2) NUS(2)(82) ECCV: European Conference on Computer VisionRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(2) NUS(2)(83) USENIX Security: USENIX Security SymposiumRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(2) NUS(2)(84) ALT: International Conference on Algorithmic Learning TheoryRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(4) NUS(2)(85) ASE: International Conference on Automated Software EngineeringRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(86) ASIACRYPT: Annual International Conference on the Theory and Application of Cryptology and Information SecurityRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(87) CC: International Conference on Compiler ConstructionRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(88) DATE: IEEE/ACM Design, Automation & Test in Europe ConferenceRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(89) ECAI: European Conference on Artificial IntelligenceRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(4) NUS(2)(90) ECML: European Conference on Machine LearningRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(91) EDBT: International Conference on Extending DB TechnologyRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(92) EMNLP: Conference on Empirical Methods in Natural Language ProcessingRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(93) ER: Intl Conf on Conceptual ModelingRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(94) ESOP: European Symposium on ProgrammingRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(2) NUS(2)(95) Euro-Par: European Conference on Parallel ProcessingRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(96) FSTTCS: Conference on Foundations of Software Technology and Theoretical Computer ScienceRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(97) ICPP: Intl Conf on Parallel ProcessingRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(98) ICSR: IEEE Intl Conf on Software ReuseRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(4) NUS(2)(99) MFCS: Mathematical Foundations of Computer ScienceRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(100) PEPM: ACM SIGPLAN Symposium on Partial Evaluation and Semantics Based Programming ManipulationRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(4) NUS(2)(101) RTA: International Conference on Rewriting Techniques and ApplicationsRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(102) SAS: International Static Analysis SymposiumRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(103) STACS: Symp on Theoretical Aspects of Computer ScienceRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(104) TACAS: International Conference on Tools and Algorithms for the Construction and Analysis of SystemsRefs: UCLA(2) CCF(2) NTU(2) TSINGHUA(3) NUS(2)(105) CP: Intl Conf on Principles & Practice of Constraint ProgRefs: UCLA(2) CCF(2) NTU(2) NUS(2)(106) CSFW: IEEE Computer Security Foundations WorkshopRefs: CCF(2) NTU(2) TSINGHUA(2) NUS(2)(107) CSSAC: Cognitive Science Society Annual ConferenceRefs: UCLA(2) CCF(2) NTU(2) NUS(2)(108) ECOOP: European Conference on Object-Oriented ProgrammingRefs: CCF(2) NTU(2) TSINGHUA(2) NUS(2)(109) IEEEIT: IEEE Symposium on Information TheoryRefs: UCLA(2) CCF(2) NTU(2) NUS(2)(110) ISRE: Requirements EngineeringRefs: UCLA(2) CCF(2) NTU(2) NUS(2)(111) PG: Pacific GraphicsRefs: UCLA(2) CCF(2) NTU(2) NUS(2)(112) CGI: Computer Graphics InternationalRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(3) NUS(2)(113) FCCM: IEEE Symposium on Field Programmable Custom Computing MachinesRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(3) NUS(2)(114) FoSSaCS: International Conference on Foundations of Software Science and Computation StructuresRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(3) NUS(2)(115) ICC: IEEE International Conference on CommunicationsRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(4) NUS(2)(116) ICDM: IEEE International Conference on Data MiningRefs: UCLA(3) CCF(2) NTU(2) TSINGHUA(2) NUS(3)(117) ICME: IEEE International Conference on Multimedia & ExpoRefs: UCLA(3) CCF(2) NTU(2) TSINGHUA(4) NUS(2)(118) ICPR: Intl Conf on Pattern RecognitionRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(4) NUS(2)(119) ICS: Intl Conf on SupercomputingRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(3) NUS(2)(120) LCN: IEEE Annual Conference on Local Computer NetworksRefs: UCLA(2) CCF(3) NTU(2) TSINGHUA(4) NUS(2)(121) NDSS: Network and Distributed System Security SymposiumRefs: UCLA(2) CCF(2) NTU(4) TSINGHUA(2) NUS(4)(122) NOSSDAV: Network and Operating System Support for Digital Audio and Video Refs: UCLA(2) CCF(3) NTU(2) TSINGHUA(3) NUS(2)(123) CADE: Conference on Automated DeductionRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(124) CAiSE: Intl Conf on Advanced Info System EngineeringRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(125) CoNLL: Conference on Natural Language LearningRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(126) CoopIS: Conference on Cooperative Information SystemsRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(127) DAS: International Workshop on Document Analysis SystemsRefs: UCLA(2) NTU(2) TSINGHUA(4) NUS(2)(128) DASFAA: Database Systems for Advanced ApplicationsRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(129) DEXA: Database and Expert System ApplicationsRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(130) EACL: Annual Meeting of European Association Computational Linguistics Refs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(131) ESA: European Symp on AlgorithmsRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(132) ICCL: IEEE Intl Conf on Computer LanguagesRefs: UCLA(2) NTU(2) TSINGHUA(4) NUS(2)(133) ICDAR: International Conference on Document Analysis and Recognition Refs: UCLA(2) CCF(3) NTU(2) NUS(2)(134) ICECCS: IEEE Intl Conf on Eng. of Complex Computer SystemsRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(135) ICIP: Intl Conf on Image ProcessingRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(136) ICSM: Intl Conf on Software MaintenanceRefs: CCF(2) NTU(2) TSINGHUA(4) NUS(2)(137) ICTAI: IEEE International Conference on Tools with Artificial IntelligenceRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(138) IJCNN: Intl Joint Conference on Neural NetworksRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(139) IPCO: MPS Conf on integer programming & comb optimizationRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(140) ISAAC: Intl Symp on Algorithms and ComputationRefs: UCLA(2) NTU(2) TSINGHUA(4) NUS(2)(141) JCDL: ACM/IEEE Joint Conference on Digital LibrariesRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(142) MASCOTS: Modeling, Analysis, and Simulation On Computer and Telecommunication SystemsRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(143) NAACL: The Annual Conference of the North American Chapter of the Association for Computational LinguisticsRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(144) PADL: Practical Aspects of Declarative LanguagesRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(145) SEKE: International Conference on Software Engineering and Knowledge Engineering Refs: UCLA(2) CCF(3) NTU(2) NUS(2)(146) SRDS: Symp on Reliable Distributed SystemsRefs: UCLA(2) NTU(2) TSINGHUA(3) NUS(2)(147) SSDBM: Intl Conf on Scientific and Statistical DB MgmtRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(148) VLSI: IEEE Symp VLSI CircuitsRefs: UCLA(2) NTU(2) TSINGHUA(4) NUS(2)(149) WACV: IEEE Workshop on Apps of Computer VisionRefs: UCLA(2) NTU(2) TSINGHUA(4) NUS(2)(150) WCNC: IEEE Wireless Communications & Networking ConferenceRefs: UCLA(2) CCF(3) NTU(2) NUS(2)(151) AI-ED: World Conference on AI in EducationRefs: UCLA(2) NTU(2) NUS(2)(152) AID: Intl Conf on AI in DesignRefs: UCLA(2) NTU(2) NUS(2)(153) AMAI: Artificial Intelligence and MathsRefs: UCLA(2) NTU(2) NUS(2)(154) AMIA: American Medical Informatics Annual Fall Symposium Refs: UCLA(2) NTU(2) NUS(2)(155) ASAP: Intl Conf on Apps for Specific Array Processors Refs: UCLA(2) NTU(2) NUS(2)(156) ASS: IEEE Annual Simulation SymposiumRefs: UCLA(2) NTU(2) NUS(2)(157) CAIP: Inttl Conf on Comp. Analysis of Images and Patterns Refs: UCLA(2) NTU(2) NUS(2)(158) CANIM: Computer AnimationRefs: UCLA(2) NTU(2) NUS(2)(159) CC: IEEE Symp on Computational ComplexityRefs: UCLA(2) NTU(2) NUS(2)(160) CCC: Cluster Computing ConferenceRefs: UCLA(2) NTU(2) NUS(2)(161) DNA: Meeting on DNA Based ComputersRefs: UCLA(2) NTU(2) NUS(2)(162) DOOD: Deductive and Object-Oriented DatabasesRefs: UCLA(2) NTU(2) NUS(2)(163) EUROCOLT: European Conf on Learning TheoryRefs: UCLA(2) NTU(2) NUS(2)(164) EUROGRAPH: European Graphics ConferenceRefs: UCLA(2) NTU(2) NUS(2)(165) FODO: Intl Conf on Foundation on Data OrganizationRefs: UCLA(2) NTU(2) NUS(2)(166) HCS: Hot Chips SympRefs: UCLA(2) NTU(2) NUS(2)(167) IAAI: Innovative Applications in AIRefs: UCLA(2) NTU(2) NUS(2)(168) IEEE Intl Conf on Formal Engineering MethodsRefs: UCLA(2) NTU(2) NUS(2)(169) IPCCC: IEEE Intl Phoenix Conf on Comp & Communications Refs: UCLA(2) NTU(2) NUS(2)(170) IPTPS: Annual International Workshop on Peer-To-Peer Systems Refs: UCLA(2) CCF(2) TSINGHUA(2)(171) ISTCS: Israel Symp on Theory of Computing and Systems Refs: UCLA(2) NTU(2) NUS(2)(172) Intl Conf on Integrated Formal MethodsRefs: UCLA(2) NTU(2) NUS(2)(173) LATIN: Intl Symp on Latin American Theoretical Informatics Refs: UCLA(2) NTU(2) NUS(2)(174) LFCS: Logical Foundations of Computer ScienceRefs: UCLA(2) NTU(2) NUS(2)(175) MMCN: ACM/SPIE Multimedia Computing and Networking Refs: UCLA(2) NTU(2) NUS(2)(176) NetStore: Network Storage SymposiumRefs: UCLA(2) NTU(2) NUS(2)(177) PADS: ACM/IEEE/SCS Workshop on Parallel & Dist Simulation Refs: UCLA(2) NTU(2) NUS(2)(178) PT: Perf Tools - Intl Conf on Model Tech & Tools for CPE Refs: UCLA(2) NTU(2) NUS(2)(179) SSD: Intl Symp on Large Spatial DatabasesRefs: UCLA(2) NTU(2) NUS(2)(180) SUPER: ACM/IEEE Supercomputing ConferenceRefs: UCLA(2) NTU(2) NUS(2)(181) SWAT: Scandinavian Workshop on Algorithm TheoryRefs: UCLA(2) NTU(2) NUS(2)(182) SenSys: ACM Conference on Embedded Networked Sensor SystemsRefs: UCLA(2) CCF(2) TSINGHUA(2)(183) WADS: Workshop on Algorithms and Data StructuresRefs: UCLA(2) NTU(2) NUS(2)(184) WCW: Web Caching WorkshopRefs: UCLA(2) NTU(2) NUS(2)(185) WSC: Winter Simulation ConferenceRefs: UCLA(2) NTU(2) NUS(2)(186) DSN: The International Conference on Dependable Systems and NetworksRefs: UCLA(2) CCF(2) NTU(4) TSINGHUA(3) NUS(4)(187) CASES: International Conference on Compilers, Architecture, and Synthesis for Embedded SystemsRefs: CCF(3) NTU(2) TSINGHUA(3) NUS(2)(188) CODES+ISSS: Intl Conf on Hardware/Software Codesign & System SynthesisRefs: CCF(3) NTU(2) TSINGHUA(3) NUS(2)(189) ISSTA: International Symposium on Software Testing and AnalysisRefs: CCF(2) NTU(4) TSINGHUA(2) NUS(4)(190) WCRE: SIGSOFT Working Conf on Reverse EngineeringRefs: UCLA(3) NTU(3) TSINGHUA(4) NUS(2)(191) ACSAC: Annual Computer Security Applications ConferenceRefs: UCLA(2) CCF(2) TSINGHUA(3)(192) APLAS: Asian Symposium on Programming Languages and SystemsRefs: CCF(3) NTU(2) NUS(2)(193) CSCW: Conference on Computer Supported Cooperative WorkRefs: NTU(2) TSINGHUA(3) NUS(2)(194) ESEC: European Software Engineering ConfRefs: UCLA(2) CCF(2) TSINGHUA(3)(195) ESORICS: European Symposium on Research in Computer Security Refs: UCLA(2) CCF(2) TSINGHUA(3)(196) FPL: Field-Programmable Logic and ApplicationsRefs: CCF(3) NTU(2) NUS(2)(197) Fast Software EncryptionRefs: UCLA(3) NTU(2) NUS(2)(198) GECCO: Genetic and Evolutionary Computation ConferenceRefs: CCF(3) NTU(2) NUS(2)(199) HASKELL: Haskell WorkshopRefs: UCLA(4) NTU(2) NUS(2)(200) IC3N: Intl Conf on Comp Comm and NetworksRefs: UCLA(3) NTU(2) NUS(2)(201) IEEE VisualizationRefs: NTU(2) TSINGHUA(3) NUS(2)(202) IMC: Internet Measurement Conference/WorkshopRefs: UCLA(3) CCF(2) TSINGHUA(2)(203) IWSSD: International Workshop on Software Specifications & Design Refs: UCLA(2) CCF(3) NTU(2)(204) PPDP: Principles and Practice of Declarative ProgrammingRefs: NTU(4) TSINGHUA(4) NUS(2)(205) RAID: International Symposium on Recent Advances in Intrusion Detection Refs: UCLA(2) CCF(2) TSINGHUA(4)(206) WABI: Workshop on Algorithms in BioinformaticsRefs: NTU(2) TSINGHUA(3) NUS(2)(207) DSIC: Intl Symp om Distributed ComputingRefs: NTU(2) NUS(2)(208) DocEng: ACM Symposium on Document EngineeringRefs: NTU(2) NUS(2)(209) EUROSYS: EUROSYSRefs: CCF(2) TSINGHUA(2)(210) European Symposium on Research in Computer SecurityRefs: NTU(2) NUS(2)(211) HPDC: IEEE International Symposium on High Performance Distributed Computing Refs: CCF(2) TSINGHUA(2)(212) IEEE/WIC: International Joint Conf on Web Intelligence and Intelligent Agent Technology Refs: NTU(2) NUS(2)(213) ISSCC: IEEE Intl Solid-State Circuits ConfRefs: UCLA(2) NTU(2)(214) MOBISYS: International Conference on Mobile Systems, Applications, and Services Refs: UCLA(2) TSINGHUA(2)(215) MPC: Mathematics of Program ConstructionRefs: NTU(2) NUS(2)(216) MPPOI: Massively Par Proc Using Opt InterconnsRefs: UCLA(2) NTU(2)(217) SCA: ACM/Eurographics Symposium on Computer AnimationRefs: CCF(2) TSINGHUA(2)(218) SSR: ACM SIGSOFT Working Conf on Software ReusabilityRefs: UCLA(2) NTU(2)(219) UIST: ACM Symposium on User Interface Software and TechnologyRefs: CCF(2) TSINGHUA(2)(220) CSL: Annual Conf on Computer Science LogicRefs: UCLA(3) CCF(2) NTU(3) TSINGHUA(4) NUS(3)(221) IH: Workshop on Information HidingRefs: UCLA(3) CCF(2) NTU(3) TSINGHUA(3) NUS(3)(222) COMPSAC: International Computer Software and Applications ConferenceRefs: UCLA(3) CCF(2) NTU(3) NUS(3)(223) FCT: International Symposium Fundamentals of Computation TheoryRefs: UCLA(3) CCF(2) NTU(3) NUS(3)(224) ICCB: International Conference on Case-Based ReasoningRefs: UCLA(3) CCF(2) NTU(3) NUS(3)(225) ICRA: IEEE Intl Conf on Robotics and AutomationRefs: UCLA(4) CCF(2) NTU(3) NUS(4)(226) ILP: International Workshop on Inductive Logic ProgrammingRefs: CCF(2) NTU(4) TSINGHUA(4) NUS(4)(227) PKDD: European Conference on Principles and Practice of Knowledge Discovery in DatabasesRefs: CCF(2) NTU(3) TSINGHUA(3) NUS(4)(228) EC: ACM Conference on Electronic CommerceRefs: NTU(4) TSINGHUA(2) NUS(4)(229) IJCAR: International Joint Conference on Automated ReasoningRefs: CCF(2) NTU(4) NUS(4)(230) IPSN: International Conference on Information Processing in Sensor NetworksRefs: UCLA(2) CCF(3) TSINGHUA(3)(231) ITC: IEEE Intl Test ConfRefs: UCLA(2) NTU(4) NUS(4)(232) MiddlewareRefs: NTU(4) TSINGHUA(2) NUS(4)(233) PPSN: Parallel Problem Solving from NatureRefs: NTU(4) CORE(2) NUS(4)(234) TLCA: Typed Lambda Calculus and ApplicationsRefs: CCF(2) NTU(4) NUS(4)(235) CCC: IEEE Conference on Computational ComplexityRefs: CCF(2) TSINGHUA(4)(236) CEC: IEEE Congress on Evolutionary ComputationRefs: CCF(3) CORE(2)(237) CLUSTER: Cluster ComputingRefs: CCF(2) TSINGHUA(3)(238) CoNEXT: ACM International Conference on emerging Networking EXperiments and TechnologiesRefs: CCF(2) TSINGHUA(4)(239) ECDL: European Conference on Digital LibrariesRefs: NTU(4) NUS(2)(240) EGSR: Eurographics Symposium on RenderingRefs: CCF(2) TSINGHUA(4)(241) EuroGraphics: EuroGraphics Symposium on geometry processingRefs: CCF(2) TSINGHUA(3)(242) FPGA: International Symposium on Field-Programmable Gate ArraysRefs: CCF(2) TSINGHUA(3)(243) GCSE: International Conference on Generative and Component-Based Software Engineering Refs: NTU(4) NUS(2)(244) ICAPS: International Conference on Automated Planning and SchedulingRefs: CCF(2) TSINGHUA(3)(245) ISSS: International Symposium on System SynthesisRefs: UCLA(2) TSINGHUA(3)(246) IWQoS: International Workshop on Quality of ServiceRefs: CCF(2) TSINGHUA(3)(247) Networking: International Conferences on NetworkingRefs: CCF(2) TSINGHUA(4)(248) PKC: International Workshop on Practice and Theory in Public Key CryptographyRefs: CCF(2) TSINGHUA(4)(249) Percom: International Conference on Pervasive Computing and CommunicationsRefs: CCF(2) TSINGHUA(3)(250) SDM: SIAM International Conference on Data MiningRefs: CCF(2) TSINGHUA(3)(251) SPM: ACM Solid and Physical Modeling SymposiumRefs: CCF(2) TSINGHUA(4)(252) TCC: Theory of Cryptography ConferenceRefs: CCF(2) TSINGHUA(3)(253) ACM SIGARCHRefs: CCF(2)(254) AOSD: Aspect-Oriented Software DevelopmentRefs: TSINGHUA(2)(255) CHI: Computer Human InteractionRefs: TSINGHUA(2)(256) ECRTS: Euromicro Conference on Real-Time SystemsRefs: CORE(2)(257) EuroVis: Eurographics/IEEE-VGTC Symposium on VisualizationRefs: CCF(2)(258) GP: Genetic Programming ConferenceRefs: UCLA(2)(259) HOT CHIPS: A Symposium on High Performance ChipsRefs: CCF(2)(260) ICCD: International Conference on Computer DesignRefs: CCF(2)(261) ICMI: International Conference on Multimodal InterfaceRefs: CCF(2)(262) ICWE: International Conference on Web EngineeringRefs: NUS(2)(263) ISWC: International Semantic Web ConferenceRefs: TSINGHUA(2)(264) IWCASE: Intl Workshop on Computer-Aided Software EngRefs: UCLA(2)(265) LCTES: Conference on Language, Compiler and Tool Support for Embedded Systems Refs: CCF(2)(266) MFPS: Mathematical Foundations of Programming SemanticsRefs: CCF(2)(267) MSST: Mass Storage Systems and TechnologiesRefs: CCF(2)(268) MoDELS: International Conference on Model Driven Engineering Languages and Systems Refs: CCF(2)(269) SGP: Eurographics Symposium on Geometry ProcessingRefs: CCF(2)(270) TCS: IFIP International Conference on Theoretical Computer ScienceRefs: CCF(2)(271) WDAG: Workshop on Distributed AlgorithmsRefs: UCLA(2)Rank #3(272) ECIR: European Conference on Information RetrievalRefs: UCLA(3) CCF(3) NTU(3) TSINGHUA(3) NUS(3)(273) MDM: Intl Conf on Mobile Data Access/ManagementRefs: UCLA(3) CCF(3) NTU(3) TSINGHUA(3) NUS(3)(274) ACCV: Asian Conference on Computer VisionRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(275) APSEC: Asia-Pacific Software Engineering ConferenceRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(276) Globecom: IEEE Global Communications Conference, incorporating the Global Internet SymposiumRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(277) ICANN: International Conf on Artificial Neural NetworksRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(278) ICONIP: Intl Conf on Neural Information ProcessingRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(279) ICPADS: Intl Conf on Parallel and Distributed SystemsRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(280) LOPSTR: International Symposium on Logic-based Program Synthesis and Transformation Refs: UCLA(3) CCF(3) NTU(3) NUS(3)(281) NOMS: IEEE Network Operations and Management SympRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(282) PAKDD: Pacific-Asia Conf on Know. Discovery & Data MiningRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(283) PRICAI: Pacific Rim Intl Conf on AIRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(284) SAC: ACM/SIGAPP Symposium on Applied ComputingRefs: UCLA(3) CCF(3) NTU(3) NUS(3)(285) FASE: Fundamental Approaches to Software EngineeringRefs: UCLA(3) NTU(3) TSINGHUA(4) NUS(3)。
LabVIEW Real-Time Module 8.6 用户手册说明书

LabVIEW Real-Time Module™Release and Upgrade NotesVersion 8.6This document provides system requirements, installation instructions,descriptions of new features, and information about upgrade andcompatibility issues for version 8.6 of the LabVIEW Real-Time Module.Refer to the Getting Started with the LabVIEW Real-Time Module manualfor exercises you can complete to familiarize yourself with the Real-TimeModule.ContentsSystem Requirements (2)Installing the Real-Time Module 8.6 (3)Activating the Real-Time Module (3)RT Target Configuration (4)New Real-Time Module 8.6 Features (5)CompactRIO Scan Mode Support (5)NI Distributed System Manager Support (6)New VIs for Managing Memory and CPU Resources (7)Reliance™ File System Support (7)Software-Triggered Timing Sources (7)Easier IP Address Setup for RT Targets (7)TDMS Support for VxWorks Targets (8)Improved Ethernet Compatibility (8)Real-Time Execution Trace Toolkit 2.0.1 (8)Activating the Real-Time Execution Trace Toolkit (8)Upgrade and Compatibility Issues (9)Upgrading from RT Module 8.5.x (9)Upgrading from RT Module 8.2.x and Earlier (9)Real-Time Module Examples (10)Known Issues with the Real-Time Module 8.6 (10)System RequirementsTable1 describes the system requirements to run version 8.6 of theReal-Time Module. The Real-Time Module system requirements are inaddition to the LabVIEW system requirements listed in the LabVIEWRelease Notes.Table 1. System Requirements for the Real-Time Module 8.6Platform Media and SystemRequirements Important NotesWindows 2000/XP/Vista National Instrumentsrecommends that you haveat least 300 MB of diskspace for the minimumReal-Time Moduleinstallation or 750 MB ofdisk space for the completeReal-Time Moduleinstallation, which includesthe Real-Time andEmbedded drivers from theNational InstrumentsDevice Drivers media.You might need more memory than the LabVIEW-recommended 1 GB of RAM depending on the size of the application you design in LabVIEW on the host computer.To view and control the front panel of a VI running on an RT target remotely using a Web browser, National Instruments recommends Internet Explorer 5.5 with Service Pack 2 or later.Real-Time Module Release and Upgrade © National Instruments Corporation 3Real-Time Module Release and Upgrade NotesInstalling the Real-Time Module 8.6This section includes information about installing the Real-Time Module on a development, or host, computer from the CD included in theReal-Time Module kit. If you installed the Real-Time Module from the LabVIEW 8.6 Platform DVD, you do not need to reinstall the Real-Time Module from the CD.Note You must install LabVIEW 8.6 before attempting to install the Real-Time Module 8.6. Refer to the LabVIEW Release Notes for the LabVIEW installation instructions.Complete the following steps to install the Real-Time Module on the host computer.1.Disable any automatic virus detection programs before you install. Some virus detection programs interfere with the installation program.2.Log on as an administrator or as a user with administrator privileges.3.Insert the LabVIEW Real-Time Module installation CD into theCD-ROM drive. The LabVIEW Real-Time Module installationprogram runs automatically.4.Follow the instructions that appear on the screen. The prompt directsyou to install the Real-Time Module and activate your Real-TimeModule license. Refer to the Activating the Real-Time Module sectionof this document for more information about activating the Real-TimeModule.5.Install the Real-Time and Embedded drivers and any other drivers thatyou require from the National Instruments Device Driver media.Activating the Real-Time ModuleRefer to the Activation Instructions for National Instruments Software for information about activation. You also can activate software at /activate.RT Target ConfigurationUse Measurement & Automation Explorer (MAX) to configure RT targetsand to install software and drivers on targets.•Networked RT Targets—Refer to the Max Remote Systems Helpbook in the Measurement & Automation Explorer Help, available byselecting Help»MAX Help from MAX, for information aboutconfiguring networked RT targets.•Desktop PC Targets—Refer to the Using Desktop PCs as RT Targetswith the LabVIEW Real-Time Module document for information aboutconfiguring a desktop PC as a networked RT target. You can access thedocument from Windows by selecting to install the Real-Time Moduledocumentation when you install the Real-Time Module. Select Start»All Programs»National Instruments»LabVIEW 8.6»LabVIEWManuals to open the labview\manuals directory and thendouble-click RT_Using_PC_as_RT_Target.pdf to open thedocument.Real-Time Module Release and Upgrade New Real-Time Module 8.6 FeaturesThe Real-Time Module 8.6 includes the following new features. Refer tothe LabVIEW Help, available by selecting Help»Search the LabVIEWHelp, for more information about the following new features.CompactRIO Scan Mode SupportThe Real-Time Module 8.6 supports the new CompactRIO Scan Modefeatures. Refer to the Getting Started with CompactRIO and LabVIEW:Scan Mode Edition manual for an introduction to using the newCompactRIO Scan Mode features.NI Scan Engine SupportThe Real-Time Module 8.6 includes support for the NI Scan Engine. TheNI Scan Engine enables efficient access to coherent sets of I/O channelsusing a scan that stores data in a global memory map and updates all valuesat a single rate. Refer to the Real-Time Module»Real-Time ModuleConcepts»Accessing I/O with the NI Scan Engine»Using the NI ScanEngine topic on the Contents tab of the LabVIEW Help for moreinformation about the NI Scan Engine and related features.I/O Variable SupportIf you have an RT target with the NI Scan Engine installed, you can takeadvantage of the I/O variable, a new variable type that simplifies I/Oaccess. LabVIEW automatically detects I/O modules connected to targetswith the NI Scan Engine installed, and creates an I/O variable in theProject Explorer window for each connected I/O channel. Refer to theReal-Time Module»Real-Time Module Concepts»Accessing I/O withthe NI Scan Engine»Using I/O Variables topic on the Contents tab of theLabVIEW Help for more information about I/O variables.I/O Forcing SupportI/O variables support forcing for debugging and manual control of I/O. Usethe NI Distributed System Manager to force and unforce I/O valuesmanually. Use the Forcing VIs on the NI Scan Engine palette to force andunforce I/O values programmatically. Refer to the VI and FunctionReference»Measurement I/O VIs and Functions»NI Scan EngineVIs»Forcing VIs book on the Contents tab of the LabVIEW Help for moreinformation about the Forcing VIs.© National Instruments Corporation5Real-Time Module Release and Upgrade NotesScan Engine FaultsRT targets with the NI Scan Engine installed use faults to addressasynchronous error conditions. Refer to the Real-Time Module»Real-Time Module Concepts»Accessing I/O with the NI ScanEngine»Scan Engine Faults topic on the Contents tab of the LabVIEWHelp for more information about faults.Scan Engine VIsThe Real-Time Module 8.6 installs the new NI Scan Engine palette as asubpalette of the Measurement I/O palette. You can use the NI Scan EngineVIs to programmatically interface with the scan engine running on thetarget. Refer to the VI and Function Reference»Measurement I/O VIsand Functions»NI Scan Engine VIs book on the Contents tab of theLabVIEW Help for more information about the NI Scan Engine VIs.Project & System Comparison DialogThe Real-Time Module 8.6 includes a new Project & SystemComparison dialog box that you can use to resolve conflicts that resultfrom project configuration or hardware changes involving targets with theNI Scan Engine installed.Function BlocksThe Real-Time Module 8.6 includes standard function blocks defined inthe IEC 1131-3 specification. The functionality of the Real-Time functionblocks partially overlaps with functionality provided by LabVIEW VIs andfunctions. Use function blocks if you want to publish parameter values withshared variables or if you want to use the IEC 1131-3 function blockprogramming paradigm. Refer to the Real-Time Module»Real-TimeVIs»Function Blocks book on the Contents tab of the LabVIEW Help formore information about using function blocks in LabVIEW.NI Distributed System Manager SupportYou can use the new NI Distributed System Manager to monitor andmanage variables, faults, scan engine modes, and system resources on RTtargets. From LabVIEW, select Tools»Distributed System Manager tolaunch the NI Distributed System Manager. Refer to the NI DistributedSystem Manager Help for information about using the NI DistributedSystem Manager.Real-Time Module Release and Upgrade New VIs for Managing Memory and CPU ResourcesThe Real-Time Module 8.6 includes new Real-Time Utilities VIs you canuse to monitor target CPU and memory usage programmatically. TheReal-Time Module also includes new SMP CPU Utilities VIs you can useto specify the set of CPUs available for automatic load balancing on amulti-CPU target with the NI RT Extensions for SMP installed. Refer to theReal-Time Module»Real-Time VIs»Real-Time Utilities VIs book on theContents tab of the LabVIEW Help for information about the Real-TimeUtilities VIs. Refer to the Real-Time Module»Real-Time VIs»SMP CPUUtilities VIs book on the Contents tab of the LabVIEW Help forinformation about the SMP CPU Utilities VIs.Reliance™ File System SupportThe Reliance™ file system provides fast disk access and data preservationin the event of a power interruption. Refer to the Using Desktop PCs as RTTargets with the LabVIEW Real-Time Module document for informationabout installing the Reliance™ file system on an RT Desktop PC target.Reliance™ is a trademark of Datalight, Inc. Copyright 1989–2008Datalight, Inc., All Rights Reserved. Datalight® is a registered trademarkof Datalight, Inc.Software-Triggered Timing SourcesThe Real-Time Module 8.6 supports software-triggered timing sources.You can use software-triggered timing sources to trigger timed structuresbased on software-defined or user-defined events, rather than a hardwareclock. Refer to the Fundamentals»Loops and Structures»Concepts»Timed Structures»Selecting a Timing Source for a Timed Structuretopic on the Contents tab of the LabVIEW Help for information aboutcreating and using software-triggered timing sources.Easier IP Address Setup for RT TargetsRT targets with the Real-Time Module 8.6 installed include automaticnetwork connection capabilities. When you plug an RT 8.6 target into anetwork and turn the target on, the target uses the target name to attempt aDHCP network connection. If the target is unable to initiate a DHCPconnection, the target connects to the network with a link-local IP address.© National Instruments Corporation7Real-Time Module Release and Upgrade NotesTDMS Support for VxWorks TargetsThe Real-Time Module 8.6 includes TDMS support for VxWorks targets.Refer to the VI and Function Reference»Programming VIs andFunctions»File I/O VIs and Functions»TDM Streaming VI andFunctions book on the Contents tab of the LabVIEW Help for informationabout the TDM Streaming VI and functions.Improved Ethernet CompatibilityThe Real-Time Module 8.6 includes expanded Ethernet chipset support forRT Desktop PCs. Refer to the National Instruments Web site at /info and enter the info code etspc for more information about whichEthernet chipsets are compatible with RT Desktop PCs.Real-Time Execution Trace Toolkit 2.0.1The LabVIEW 8.6 Real-Time Module includes a 30-day full-featuredevaluation of the Real-Time Execution Trace Toolkit 2.0.1. The Real-TimeExecution Trace Toolkit includes the Real-Time Execution Trace Tool andthe Execution Trace Tool VIs. You can use the Execution Trace Tool VIsto capture the timing and execution data of VI and thread events forapplications running on an RT target. The Real-Time Execution Trace Tooldisplays the timing and event data, or trace session, on the host computer.In LabVIEW, select Tools»Real-Time Module»Execution Trace Tool todisplay the Real-Time Execution Trace Tool.Refer to the Real-Time Execution Trace Toolkit book in the LabVIEWHelp for information about using the Real-Time Execution Trace Toolkit todebug real-time applications. Select Help»Search the LabVIEW Help todisplay the LabVIEW Help. In the LabVIEW Help, browse to Toolkits»Real-Time Execution Trace Toolkit to view the Real-Time ExecutionTrace Toolkit book.Activating the Real-Time Execution Trace ToolkitRefer to the Activation Instructions for National Instruments Software forinformation about activation. You also can activate software at /activate.Real-Time Module Release and Upgrade Upgrade and Compatibility IssuesUpgrading from RT Module 8.5.xYou might encounter the following compatibility issue when upgrading tothe Real-Time Module 8.6 from the Real-Time Module 8.5.x.Floppy Disk Support DiscontinuedThe Real-Time Module no longer includes updated versions of the PXI andDesktop PC Floppy Disk Utilities. You can still use Measurement &Automation Explorer (MAX) to create previous versions of the RT floppydisks, which will continue to work with newer versions of the Real-TimeModule. However, older versions of the RT floppy disks do not supportdevice drivers added to subsequent versions of the Real-Time Module. Ifyou need to use the latest device drivers, you mush use MAX to create anRT 8.6 USB Utility drive.FieldPoint 20x0 Support DiscontinuedThe Real-Time Module no longer supports FP-20x0 and cFP-20x0 targets.You can still use FP-20x0 and cFP-20x0 targets with LabVIEW, but youcannot install the Real-Time Module 8.6 on FP-20x0 and cFP-20x0 targets.Upgrading from RT Module 8.2.x and EarlierYou might encounter the following compatibility issues when upgrading tothe Real-Time Module 8.6 from the Real-Time Module 8.2.x and earlier.RTX Support DiscontinuedThe Real-Time Module no longer supports RTX desktop targets and nolonger contains the Shared Memory VIs. Refer to the Using Desktop PCsas RT Targets with the LabVIEW Real-Time Module document forinformation about configuring a PC as an ETS RT target.IrDA Support DiscontinuedThe Real-Time Module no longer supports the IrDA protocol and no longercontains the associated IrDAVIs.Timed Loop Priority RestrictionThe Timed Loop does not support Priority values greater than 65,535.© National Instruments Corporation9Real-Time Module Release and Upgrade NotesCompatibility with VxWorks 6.1When you install the Real-Time Module 8.6 on the host computer, you alsomust install version 8.6 of the Real-Time Module software on cRIO-901xtargets. The Real-Time Module 8.6 updates the operating system oncRIO-901x targets from VxWorks 6.1 to VxWorks 6.3. Some functions inVxWorks 6.3 are not compatible with VxWorks 6.1. If you use customC code in a LabVIEW application running on a cRIO-901x target, you mustrecompile the .OUT files for VxWorks 6.3. Refer to the NI Web site at/info and enter the info code rtvx for more information.Front Panel:Open Method ErrorIn the Real-Time Module 8.2.1 and earlier, the Front Panel:Open methodfailed without returning an error. The FP.Open method now returnserror53.Real-Time Module ExamplesUse the NI Example Finder, available by selecting Help»Find Examplesfrom LabVIEW, to browse or search for RT example VIs. You also canaccess example VIs from the labview\examples\Real-Time directory. Known Issues with the Real-Time Module 8.6Refer to the readme_RT.html file on the LabVIEW 8.6 Real-TimeModule installation CD for information about known issues with theReal-Time Module 8.6.You also can launch the readme_RT.html file from Windows after youinstall the Real-Time Module. Complete the following steps to access thereadme_RT.html file from Windows.1.Select Start»All Programs»National Instruments»LabVIEW 8.6»Readme to open the labview\readme directory.The labview\readme directory contains the HTML readme files forLabVIEW and any installed LabVIEW modules and add-ons.2.Double-click readme_RT.html to open the LabVIEW Real-TimeModule Readme.Real-Time Module Release and Upgrade National Instruments, NI, , and LabVIEW are trademarks of National Instruments Corporation.Refer to the Terms of Use section on /legal for more information about NationalInstruments trademarks. Other product and company names mentioned herein are trademarks or tradenames of their respective companies. For patents covering National Instruments products, refer to theappropriate location: Help»Patents in your software, the patents.txt file on your CD, or/patents.© 2000–2008 National Instruments Corporation. All rights reserved.371374E-01June08。
各国际会议论文影响因子

SPICIS: Singapore Intl Conf on Intelligent System
PAKDD: Pacific-Asia Conf on Know. Discovery & Data Mining
EMNLP: Empirical Methods in Natural Language Processing
Rank 3:
PRICAI: Pacific Rim Intl Conf on AI
AAI: Australian National Conf on AI
ICS: Intl Conf on Supercomputing
ISSCC: IEEE Intl Solid-State Circuits Conf
HCS: Hot Chips Symp
VLSI: IEEE Symp VLSI Circuits
ICONIP: Intl Conf on Neural Information Processing
IEA/AIE: Intl Conf on Ind. & Eng. Apps of AI & Expert Sys
ICMS: International Conference on Multiagent Systems
ACL: Annual Meeting of the ACL (Association of Computational Linguist ics)
Rank 2:
AID: Intl Conf on AI in Design
AI-ED: World Conference on AI in Education
卫星定位理论与方法-第15次课-卫星定位误差源
1.10 0.91 0.91 1.14
0.48 0.42 0.4 0.5
0.59 0.5 0.48 0.59
1 0.83 0.83 1.04
1.2 1 0.91 1.18
1.2 1.1 1 1.27
0.96 0.85 0.79 1
Ex) 100m(2DRMS) accuracy ⇒ 42m(CEP)
Now has roughly the same accuracy as PPS Used by military receivers before Y-code lock is established
Scatter plot of horizontal accuracy 2 May 2000
Processing Algorithms, Operational Mode and Other Enhancements
1、Whether the user is moving or stationary. Clearly repeat observations at a stationary station would permit an improvement in precision due to the effect of averaging over time. A moving GPS receiver does not offer this possibility. 2、Whether the results are required in real-time, or if post-processing of the data is possible. Real-time positioning requires a “robust” but less precise technique to be used. The luxury of post-processing the data permits more sophisticated modelling and processing of GPS data to minimise the magnitude of residual biases and errors. 3、The level of measurement noise has a considerable influence on the precision attainable with GPS. Low measurement noise would be expected to result in comparatively high accuracy. Hence carrier phase measurements are the basis for high accuracy techniques, while pseudo-range measurements are used for low accuracy applications.
SmartSockets——tibico通讯介绍
Implementing a high performance, scalable messaging infrastructure system can be a complex and formidable endeavor, requiring a great deal of specialized knowledge and more time than many businesses can afford.TIBCO SmartSockets® real-time messaging software addresses these challenges by masking your distributed applications from the underlying complexities of your network structure-whether network servers are local or remote, for example, or whether the network ismulticast- or only unicast-enabled. In this way, SmartSockets frees your development team to focus on their core competencies. In addition, SmartSockets automatically provides an extra layer of reliability to your distributed applications at the messaging level, complementing and extending any reliability capabilities that may reside at the deeper network level.In the increasingly complex and heterogeneous environment in which your business must exchange and distribute revenue-critical information, SmartSockets provides the technology your organization needs to stay ahead: exceptional performance, very high scalability,optimum bandwidth efficiency, robust fault tolerance, reliable real-time messaging using industry-standard protocols - and much more.A Comprehensive, Flexible Offering From data delivery to connectivity, security to monitoring and management, SmartSockets isa flexible messaging solution tailored to meet your critical real-time data delivery plementing the core SmartSockets solution, TIBCO offers an extensive range of add-on products that allow you to extend the power of SmartSockets. All SmartSockets products deliver advanced functionality without sacrificing performance.BenefitsSignificantly increase message volumeTransparently adapt messaging systems to changing requirementsScale applications across the enterprise or the internet More efficiently utilize network bandwidthFeatures Publish-subscribe for one-to-many communicationsMultithreaded, multiprocessor architecture for full system exploitationOnline security safeguards vital communicationsReal-time monitoring of network applicationsPerformance optimization for maximum throughputRobust, enterprise-quality fault tolerant GMD for reliable message delivery Speed and FlexibilitySmartSockets increases development productivity and reduces development cycles by allowing your development teams to work in their preferred platform and languageenvironments, and by embracing industry standards. SmartSockets offers:Support for multiple programming languagesConsistent, intuitive interfaces across all supported platformsEasy-to-use callbacks to respond to asynchronous event notificationsSupport for eXtensible Mark-up Language (XML)Isolation from network programming complexitiesSmartSockets is based on industry standards and protocols, including JMS, PGM (Pragmatic General Multicast), TCP/IP and SSL, ensuring that companies maximize investment by eliminating barriers to communication and interaction.T TIBCO SmartSocketsThe American Stock Exchange is taking advantage of TIBCO SmartSockets' unique multicast capability to efficiently transmitmarket data to multiple subscribersin a single operation -greatlyimproving network utilization andspeed. A TIBCO Messaging Solution。
opc_da说明书opcda20_auto
Data Access Automation Interface StandardVersion 2.01January 6, 1999Synopsis:This specification is an interface for developers of OPC clients and OPC Data Access Servers.The specification is a result of an analysis and design process to develop a standard interface tofacilitate the development of servers and clients by multiple vendors that shall inter-operateseamlessly together.This document defines the OPC Data Access OLE Automation interface for developers of OPCclients and OPC Data Access Servers. The purpose of this specification is to provide an OLEAutomation interface for the OPC Data Access Server Custom Interface FunctionalityTrademarks:Most computer and software brand names have trademarks or registered trademarks. Theindividual trademarks have not been listed here.Required Runtime Environment:This specification requires Windows 95/98 (with DCOM installed), Windows NT 4.0 or later.It is recommended that Windows NT 4.0 machines be run with SP3, or later.NON-EXCLUSIVE LICENSE AGREEMENTThe OPC Foundation, a non-profit corporation (the “OPC Foundation”), has established a set of standard OLE/COM interface protocols intended to foster greater interoperability between automation/control applications, field systems/devices, and business/office applications in the process control industry.The current OPC specifications, prototype software examples and related documentation (collectively, the “OPC Materials”), form a set of standard OLE/COM interface protocols based upon the functional requirements of Microsoft’s OLE/COM technology. Such technology defines standard objects, methods, and properties for servers of real-time information like distributed process systems, programmable logic controllers, smart field devices and analyzers in order to communicate the information that such servers contain to standard OLE/COM compliant technologies enabled devices (e.g., servers, applications, etc.).The OPC Founda tion will grant to you (the “User”), whether an individual or legal entity, a license to use, and provide User with a copy of, the current version of the OPC Materials so long as User abides by the terms contained in this Non-Exclusive License Agreement (“Agreement”). If User does not agree to the terms and conditions contained in this Agreement, the OPC Materials may not be used, and all copies (in all formats) of such materials in User’s possession must either be destroyed or returned to the OPC Foundation. By using the OPC Materials, User (including any employees and agents of User) agrees to be bound by the terms of this Agreement.LICENSE GRANT:Subject to the terms and conditions of this Agreement, the OPC Foundation hereby grants to User a non-exclusive, royalty-free, limited license to use, copy, display and distribute the OPC Materials in order to make, use, sell or otherwise distribute any products and/or product literature that are compliant with the standards included in the OPC Materials.All copies of the OPC Materials made and/or distributed by User must include all copyright and other proprietary rights notices include on or in the copy of such materials provided to User by the OPC Foundation.The OPC Foundation shall retain all right, title and interest (including, without limitation, the copyrights) in the OPC Materials, subject to the limited license granted to User under this Agreement.WARRANTY AND LIABILITY DISCLAIMERS:User acknowledges that the OPC Foundation has provided the OPC Materials for informational purposes only in order to help User understand Microsoft’s OLE/COM technology. THE OPC MATERIALS ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF PERFORMANCE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. USER BEARS ALL RISK RELATING TO QUALITY, DESIGN, USE AND PERFORMANCE OF THE OPC MATERIALS. The OPC Foundation and its members do not warrant that the OPC Materials, their design or their use will meet User’s requirements, operate without interruption or be error free.IN NO EVENT SHALL THE OPC FOUNDATION, ITS MEMBERS, OR ANY THIRD PARTY BE LIABLE FOR ANY COSTS, EXPENSES, LOSSES, DAMAGES (INCLUDING, BUT NOT LIMITED TO, DIRECT, INDIRECT, CONSEQUENTIAL, INCIDENTAL, SPECIAL OR PUNITIVE DAMAGES) OR INJURIES INCURRED BY USER OR ANY THIRD PARTY AS A RESULT OF THIS AGREEMENT OR ANY USE OF THE OPC MATERIALS.GENERAL PROVISIONS:This Agreement and User’s license to the OPC Materials sha ll be terminated (a) by User ceasing all use of the OPC Materials, (b) by User obtaining a superseding version of the OPC Materials, or (c) by the OPC Foundation, at its option, if User commits a material breach hereof. Upon any termination of this Agreement, User shall immediately cease all use of the OPC Materials, destroy all copies thereof then in its possession and take such other actions as the OPC Foundation may reasonably request to ensure that no copies of the OPC Materials licensed under this Agreement remain in its possession.User shall not export or re-export the OPC Materials or any product produced directly by the use thereof to any person or destination that is not authorized to receive them under the export control laws and regulations of the United States.The Software and Documentation are provided with Restricted Rights. Use, duplication or disclosure by the U.S. government is subject to restrictions as set forth in (a) this Agreement pursuant to DFARs 227.7202-3(a); (b) subparagraph (c)(1)(i) of the Rights in Technical Data and Computer Software clause at DFARs 252.227-7013; or (c) the Commercial Computer Software Restricted Rights clause at FAR 52.227-19 subdivision (c)(1) and (2), as applicable. Contractor/ manufacturer is the OPC Foundation, P.O. Box 140524, Austin, Texas 78714-0524.Should any provision of this Agreement be held to be void, invalid, unenforceable or illegal by a court, the validity and enforceability of the other provisions shall not be affected thereby.This Agreement shall be governed by and construed under the laws of the State of Minnesota, excluding its choice or law rules.This Agreement embodies the entire understanding between the parties with respect to, and supersedes any prior understanding or agreement (oral or written) relating to, the OPC Materials.Revision 2.0 HighlightsThis revision replaces the Data Access Automation Interface previously documented in the OPC Data Access 1.0A Specification. Basically the automation interface architecture was redesigned to address ease of use by Visual Basic Programmers, and to take advantage of the technology improvements, inclusive of automation events and object support for the WithEvents keyword.Revision 2.01 January 6, 1999 HighlightsAs noted elsewhere a draft version of the Specification was inadvertently circulated as Version 2.0. The 'correct' version 2.0 has been relabeled as 2.01 (this document), redated and republished. The basic changes between the draft dated October 14, 1998 and this document include:•Removal of AsyncRefreshComplete (event for refresh follows custom interface architecture, with data returned in DataChange Event);•Change to AsyncCancelComplete to return the Transaction ID associated with the method being canceled; •Changing reference to NumItems to Count;•Correction to OPC error numbering;•Adding NON-EXCLUSIVE LICENSE AGREEMENT Section;•Minor formatting changes.Table of Contents1 INTRODUCTION (10)1.1 BACKGROUND (10)1.2 PURPOSE (10)1.3 SCOPE (11)1.4 REFERENCES (11)1.5 AUDIENCE (11)2 ARCHITECTURE (12)2.1 FUNCTIONAL REQUIREMENTS (12)2.2 OPC AUTOMATION SERVER OBJECT MODEL (13)2.3 OPC DATA ACCESS AUTOMATION OBJECT MODEL (13)2.4 DATA SYNCHRONIZATION (14)2.5 INTRODUCTION TO EXCEPTIONS AND EVENTS (14)2.5.1 Exceptions (14)2.5.2 Events (14)2.6 ARRAYS (14)2.7 COLLECTIONS (14)2.8 OPTIONAL PARAMETERS (15)2.9 METHOD PARAMETERS (15)2.10 TYPE LIBRARY (15)3 ABOUT THE OPC DATA ACCESS AUTOMATION WRAPPER DLL (16)4 OPC DATA ACCESS AUTOMATION OBJECTS & INTERFACES (17)4.1 OPCSERVER OBJECT (17)4.1.1 Summary of Properties (17)4.1.2 Summary of Methods (17)4.1.3 Summary of Events (17)4.1.4 OPCServer Properties (17)4.1.4.1 StartTime (17)4.1.4.2 CurrentTime (18)4.1.4.3 LastUpdateTime (18)4.1.4.4 MajorVersion (18)4.1.4.5 MinorVersion (18)4.1.4.6 BuildNumber (19)4.1.4.7 VendorInfo (19)4.1.4.8 ServerState (19)4.1.4.9 LocaleID (20)4.1.4.10 Bandwidth (20)4.1.4.11 OPCGroups (20)4.1.4.12 PublicGroupNames (21)4.1.4.13 ServerName (21)4.1.4.14 ServerNode (21)4.1.4.15 ClientName (22)4.1.5 OPCServer Methods (22)4.1.5.1 GetOPCServers (22)4.1.5.3 Disconnect (23)4.1.5.4 CreateBrowser (24)4.1.5.5 GetErrorString (24)4.1.5.6 QueryAvailableLocaleIDs (25)4.1.5.7 QueryAvailableProperties (25)4.1.5.8 GetItemProperties (26)4.1.5.9 LookupItemIDs (27)4.1.6 OPCServer Events (28)4.1.6.1 ServerShutDown (28)4.2 OPCBROWSER OBJECT (30)4.2.1 Summary of Properties (31)4.2.2 Summary of Methods (31)4.2.3 OPCBrowser Properties (31)4.2.3.1 Organization (31)4.2.3.2 Filter (31)4.2.3.3 DataType (32)4.2.3.4 AccessRights (32)4.2.3.5 CurrentPosition (32)4.2.3.6 Count (33)4.2.4 OPCBrowser Methods (33)4.2.4.1 Item (33)4.2.4.2 ShowBranches (34)4.2.4.3 ShowLeafs (34)4.2.4.4 MoveUp (35)4.2.4.5 MoveToRoot (35)4.2.4.6 MoveDown (35)4.2.4.7 MoveTo (35)4.2.4.8 GetItemID (36)4.2.4.9 GetAccessPaths (36)4.3 OPCGROUPS OBJECT (38)4.3.1 Summary of Properties (38)4.3.2 Summary of Methods (38)4.3.3 Summary of Events (38)4.3.4 OPCGroups Properties (39)4.3.4.1 Parent (39)4.3.4.2 DefaultGroupIsActive (39)4.3.4.3 DefaultGroupUpdateRate (39)4.3.4.4 DefaultGroupDeadband (40)4.3.4.5 DefaultGroupLocaleID (40)4.3.4.6 DefaultGroupTimeBias (40)4.3.4.7 Count (41)4.3.5 OPCGroups Methods (41)4.3.5.1 Item (41)4.3.5.3 GetOPCGroup (42)4.3.5.4 Remove (42)4.3.5.5 RemoveAll (43)4.3.5.6 ConnectPublicGroup (43)4.3.5.7 RemovePublicGroup (43)4.3.6 OPCGroups Events (44)4.3.6.1 GlobalDataChange (44)4.4 OPCGROUP OBJECT (46)4.4.1 Summary of Properties (46)4.4.2 Summary of Methods (46)4.4.3 Summary of Events (46)4.4.4 OPCGroup Properties (47)4.4.4.1 Parent (47)4.4.4.2 Name (47)4.4.4.3 IsPublic (48)4.4.4.4 IsActive (48)4.4.4.5 IsSubscribed (49)4.4.4.6 ClientHandle (49)4.4.4.7 ServerHandle (50)4.4.4.8 LocaleID (50)4.4.4.9 TimeBias (51)4.4.4.10 DeadBand (51)4.4.4.11 UpdateRate (51)4.4.4.12 OPCItems (52)4.4.5 OPCGroup Methods (52)4.4.5.1 SyncRead (52)4.4.5.2 SyncWrite (54)4.4.5.3 AsyncRead (55)4.4.5.4 AsyncWrite (56)4.4.5.5 AsyncRefresh (58)4.4.5.6 AsyncCancel (59)4.4.6 OPCGroup Events (59)4.4.6.1 DataChange (59)4.4.6.2 AsyncReadComplete (60)4.4.6.3 AsyncWriteComplete (61)4.4.6.4 AsyncCancelComplete (62)4.5 OPCITEMS OBJECT (63)4.5.1 Summary of Properties (63)4.5.2 Summary of Methods (63)4.5.3 OPCItems Properties (64)4.5.3.1 Parent (64)4.5.3.2 DefaultRequestedDataType (64)4.5.3.3 DefaultAccessPath (64)4.5.3.5 Count (65)4.5.4 OPCItems Methods (65)4.5.4.1 Item (65)4.5.4.2 GetOPCItem (66)4.5.4.3 AddItem (66)4.5.4.4 AddItems (67)4.5.4.5 Remove (68)4.5.4.6 Validate (68)4.5.4.7 SetActive (69)4.5.4.8 SetClientHandles (70)4.5.4.9 SetDataTypes (70)4.6 OPCITEM OBJECT (72)4.6.1 Summary of Properties (72)4.6.2 Summary of Methods (72)4.6.3 OPCItem Properties (72)4.6.3.1 Parent (72)4.6.3.2 ClientHandle (72)4.6.3.3 ServerHandle (73)4.6.3.4 AccessPath (73)4.6.3.5 AccessRights (73)4.6.3.6 ItemID (74)4.6.3.7 IsActive (74)4.6.3.8 RequestedDataType (74)4.6.3.9 Value (75)4.6.3.10 Quality (75)4.6.3.11 TimeStamp (75)4.6.3.12 CanonicalDataType (75)4.6.3.13 EUType (76)4.6.3.14 EUInfo (76)4.6.4 OPCItem Methods (76)4.6.4.1 Read (76)4.6.4.2 Write (77)5 OPC DATA ACCESS AUTOMATION DEFINITIONS AND SYMBOLS (79)5.1 OPCNAMESPACETYPES (79)5.2 OPCDATASOURCE (79)5.3 OPCACCESSRIGHTS (79)5.4 OPCSERVERSTATE (79)5.5 OPCERRORS (79)6 APPENDIX A - OPC AUTOMATION ERROR HANDLING (81)7 APPENDIX B – SAMPLE STRING FILTER SYNTAX FUNCTION (83)8 APPENDIX C - DATA ACCESS AUTOMATION IDL SPECIFICATION (85)9 APPENDIX D- NOTES ON AUTOMATION DATA TYPES (100)1Introduction1.1BackgroundA standard mechanism for communicating to numerous data sources, either devices on the factory floor, or a database ina control room is the motivation for this specification. The standard mechanism would consist of a standard automationinterface targeted to allow Visual Basic applications, as well as other automation enabled applications to communicate to the above named data sources.Manufacturers need to access data from the plant floor and integrate it into their existing business systems.Manufacturers must be able to utilize off the shelf tools (SCADA Packages, Databases, spreadsheets, etc.) to assemble a system to meet their needs. The key is open and effective communication architecture concentrating on data access, and not the types of data. We have addressed this need by architecting and specifying a standard automation interface to the OPC Data Access Custom interface to facilitate the need s of applications that utilize an automation interface to access plant floor data.1.2PurposeWhat is needed is a common way for automation applications to access data from any data source like a device or a database.The OPC Data Access Automation defines a standard by which automation applications can access process data. This interface provides the same functionality as the custom interface, but in an “automation friendly” manner.Given the common use of Automation to access other software environments (e.g.: RDBMS, MS Office applications, WWW objects), this interface has been tailored to ease application development, without sacrificing functionalitydefined by the Custom interface.The figure below shows an Automation client calling into an OPC Data Access Server using a 'wrapper' DLL. This wrapper translates between the custom interface provided by the server and the automation interface desired by the client.Note that in general the connection between the Automation Client and the Automation Server will be 'In Process' while the connection between the Automation Server and the Custom Server may be either In Process, Local or Remote.1.3ScopeThis document specifies a revised version of the OLE Automation interface that was specified in Release 1.0 of the OPC specification. There were several reasons for these revisions. The most important are as follows:•Make the interface easier to use by the Visual Basic Programmer•Take advantage of newer features of Visual Basic (such as events)•Allow the creation of a common wrapper DLL which could be shared by all vendorsThis document assumes that the reader is familiar with the information provided on the OPC Data Access Custom Interface Specification. That document provides an Overview of the OPC functionality as well as detailed descriptions of the behavior of the various functions.We have deliberately not duplicated that information in an attempt to maintain consistency.1.4ReferencesKraig Brockschmidt, Inside OLE, Second Edition, Microsoft Press, Redmond, WA, 1995.Microsoft Systems Journal, Q&A, April 1996, pp. 89-101.OLE Automation Programming Reference, Microsoft Press, Redmond, WA, 1996.OLE 2 Programming Reference, Vol. 1, Microsoft Press, Redmond, WA, 1994.OPC Data Access Custom Interface Standard, Version 2.0, OPC Foundation 1998.1.5AudienceThis specification is intended as reference material for developers of OPC Automation Clients that require thefunctionality of the OPC Data Access Custom Interface.The developer needs some knowledge of basic Automation concepts and terminology.2ArchitectureThe fundamental design goal is that this interface is intended to work as a 'wrapper' for existing OPC Data Access Custom Interface Servers providing an automation friendly mechanism to the functionality provided by the custom interface.2.1Functional Requirements•The automation interface provides nearly all of the functionality of the required and optional Interfaces in the OPC Data Access Custom Interface. If the OPC Data Access Custom server supports the interface, the functions and properties at the automation level will work. Automation interfaces generally do not support optional capabilities in the same way that the custom interface does. If the underlying custom interface omits some optional functionality then the corresponding automation functions and properties will exhibit some reasonable default behavior as described in more detail later in this document.•The interfaces are fully supported by VC++ and Visual Basic 5.0. They allow any application which has an OLE Automation Interface (e.g. VB, VC++, and VBA enabled applications) to access the OPC Interface, according to the limitations of the respective application.•The interface described in this specification specifically does NOT support VBScript or Java Script. A separate wrapper could be developed to accommodate the needs of VBScript and Java Script. However such an effort is outside the scope of this specification.2.2OPC Automation Server Object ModelFigure 2-1. Automation Object Hierarchy2.3OPC Data Access Automation Object ModelThe OPCServer object provides a way to access (read/write) or communicate to a set of data sources. The types of sources available are a function of the server implementation.An OPC Automation client connects to an OPC Automation Server that communicates to the underlying data source (e.g.OPC Data Access Custom Servers) through the functionality provided by the automation objects described here.The OPCServer provides an (OPCGroups) automation collection object to maintain a collection of OPCGroup Objects.The OPCGroup object allows clients to organize the data they want to access. An OPCGroup can be activated and deactivated as a unit. An OPCGrou p also provides a way for the client to ‘subscribe’ to the list of items so that it can be notified when they change. The OPCGroup Object provides an OPCItems collection of OPCItems.The OPCItem object provides a connection to a single data item in the underlying data source.2.4Data SynchronizationThere is a requirement that the VB client be able to read or receive data such that the value, quality, and timestamp information are kept in sync. Basically the client needs to be assured that the quality of the data and the timestamp matches the value.If a client obtains values using any of the Read methods it can be assured that Value, Timestamp, and Quality properties will be in synch with each other.If a client obtains data by registering for DataChange events, then the Value, Timestamp, and Quality will be in sync within the scope of the EventHandler routine.If a client mixes these two approaches it will be impossible for the client to ensure that the item properties are exactly in sync since an event which changed the properties could occur between the time the client accesses the various properties.2.5Introduction to Exceptions and Events2.5.1ExceptionsMost properties and methods described here communicate with an OPC Custom Server. In OLE Automation, there is no easy way to return an error when accessing a property. The best way to resolve this is for the automation server to generate an exception if such an error occurs in the underlying data source. This means that the client needs to have exception logic in place to handle errors.Errors that occur when setting a property are reported using the standard Visual Basic Err object. Refer to Appendix A - OPC Automation Error Handling for more details on handling errors.2.5.2EventsThe automation interface supports the event notification mechanism that is provided with Visual Basic 5.0.The Automation server triggers events in response to Async Refresh, Async Read and Async Write Method calls. In addition, Automation server triggers events when data changes according to the client specification.The implementation assumes that the Automation Client is equipped to deal with these events.2.6ArraysBy convention, the OPC Automation interface assumes that arrays are 1 based. If an array is passed to a function that is larger than the Count or NumItems parameter, only Count or NumItems elements will be used, starting at index 1.This only applies to parameters for functions and events within the automation interface. This does not apply to item values, where the data type for the item value is itself an array.To avoid errors it is suggested that VB code use “Option Base 1”.2.7CollectionsOLE Automation collections are objects that support Count, Item, and a hidden property called _NewEnum. Any object that has these properties as part of the interface can be called a collection. In VB, a collection can be iterated using either of two idioms.The first method explicitly uses Count and Item to index the elements of the collection.For I = 1 To object.Countelement = object.Item ( I )‘or…element = object( I )Next IThe second method iterates through the available items using the hidden _NewEnum function:For Each element In object‘do something with elementNext elementThe For Each method of iterating a collection is faster than the explicit Item method.Item can also be used to access a particular index, such as Item( 3 ). It doesn’t need to be used within a loop.2.8Optional ParametersOptional parameters are denoted by the keyw ord “Optional”. Optional parameters may be omitted from a method call if the default behavior is acceptable. OLE Automation requires that optional parameters be Dim’d as Variant, though they may hold a string, array, etc.2.9Method ParametersMethod parameters are assumed to be passed ByVal unless specified to be ByRef. ByRef parameters get filled in by the method and passed back.2.10Type LibraryVB uses the OPC Automation Type Library to define the following interfaces. Make sure that (in Visual Basic 5.0) Prop erties | References has “OPC Automation 2.0” checked.3About the OPC Data Access Automation Wrapper DLLThe OPC foundation has provided a reference sample of the Data Access Automation interface for the OPC foundation members use in providing an automation interface to OPC data access custom interface servers. The reference sample is provided as a DLL complete with the Visual C++ source code. Vendors may provide the DLL directly with theirproduct.Vendors that choose to modify the source code, or even just build the DLL from the source code(unchanged) must do the following prior to including or shipping the DLL.1.The name of the OPC automation DLL must be changed from OPCDAAuto.dll to a vendor specific unique name.2.The name of the OPC automation IDL(opcauto.idl) file should be changed to a vendor specific unique name.3.The helpstring ("OPC Automation 2.0") in the IDL file must be changed to reflect your vendor specific OPCautomation interface. This is the name that shows up in the Automation Type Library. Visual Basic applicationsthat use your vendor build OPC automation interface DLL will include the DLL by using the type library.4.All guid’s in the IDL file must be changed to new values that are generated by using the Guidgen tool. This isrequired to prevent the vendor built automation interface library from being confused with another vendors builtautomation library or the OPC foundation provided automation library.The vendor is encouraged to not change the existing automation interfaces. If additional functionality is desired, a new object and interface should be added and should replicate all the functionality of the existing object that is being added to.The OPC foundation has also provide a visual basic sample that demonstrates usage of the Data Access Automation interface. This sample is intended only to demonstrate the functionality of the OPC data access automation interface.4OPC Data Access Automation Objects & Interfaces4.1OPCServer ObjectDescription A client creates the OPCServer Automation object. The client then 'connects' it to an OPC Data Access Custom Interface (see the 'Connect' method). The OPCServer object can now be used toobtain general information about an OPC server and to create and manipulate the collection ofOPCGroup objects.'Syntax OPCServerRemarks The WithEvents syntax enables the object to support the declared events for the particular object.For the OPCServer, the only event defined is the ServerShutDown. The OPCGroup (describedlater) has all the events associated with DataChange and the events as required to support theAsynchronous methods of the OPCGroup object.Example Dim WithEvents AnOPCServer As OPCServerSet AnOPCServer = New OPCServer4.1.1Summary of Properties4.1.2Summary of Methods4.1.3Summary of Events4.1.4OPCServer Properties4.1.4.1StartTimeDescription(Read-only) Returns the time the server started running. This is the start time of the server that the client has specified to connect to. Multiple Clients connecting to the same server can be assuredthat each client will read the same value from the server for this property.Syntax StartTime As DateRemarks The automation server is expected to use the custom interface GetStatus () to obtain the values for this property as well as many of the other properties defined as properties of the OPCServer. Anerror occurs if the client has not connected to a Data Access Server via the Connect method. Example Dim AnOPCServerTime As DateAnOPCServerTime = AnOPCServer.StartTimeDescription(Read-only) Returns the current time from the server. When you access this property, you will get the value that the automation server has obtained from the custom server via the GetStatus ()interface.Syntax CurrentTime As DateRemarks An error occurs if the client has not connected to a Data Access Server via the Connect method. Example Dim AnOPCServerTime As DateAnOPCServerTime = AnOPCServer.CurrentTime4.1.4.3LastUpdateTimeDescription(Read-only) Returns the last update time from the server. When you access this property, you will get the value that the automation server has obtained from the custom server via the GetStatus()interface.Syntax LastUpdateTime As DateRemarks Returns the last time data was sent from the server to a client application.An error occurs if the client has not connected to a Data Access Server via the Connect method. Example Dim AnOPCServerTime As DateAnOPCServerTime = stUpdateTime4.1.4.4MajorVersionDescription(Read-only) Returns the major part of the server version number (e.g. the “1” in version 1.32).When you access this property, you will get the value that the automation server has obtained fromthe custom server via the GetStatus() interface.Syntax MajorVersion As IntegerRemarks An error occurs if the client has not connected to a Data Access Server via the Connect method. Example Dim AnOPCServerMajorVersion As StringAnOPCServerMajorVersion = Str(AnOPCServer.MajorVersion)4.1.4.5MinorVersionDescription(Read-only) Returns the minor part of the server version number (e.g. the “32” in version 1.32).When you access this property, you will get the value that the automation server has obtained fromthe custom server via the GetStatus () interface.Syntax MinorVersion As IntegerRemarks An error occurs if the client has not connected to a Data Access Server via the Connect method. Example Dim AnOPCServerMinorVersion As StringAnOPCServerMinorVersion = Str(AnOPCServer.MinorVersion)。
国际计算机会议与期刊分级列表
Computer Science Department Conference RankingsSome conferences accept multiple categories of papers. The rankingsbelow are for the most prestigious category of paper at a givenconference. All other categories should be treated as "unranked".AREA: Artificial Intelligence and Related SubjectsRank 1:IJCAI: Intl Joint Conf on AIAAAI: American Association for AI National ConferenceICAA: International Conference on Autonomous Agents(现改名为AAMAS) CVPR: IEEE Conf on Comp Vision and Pattern RecognitionICCV: Intl Conf on Computer VisionICML: Intl Conf on Machine LearningKDD: Knowledge Discovery and Data MiningKR: Intl Conf on Principles of KR & ReasoningNIPS: Neural Information Processing SystemsUAI: Conference on Uncertainty in AIACL: Annual Meeting of the ACL (Association of Computational Linguistics) Rank 2:AID: Intl Conf on AI in DesignAI-ED: World Conference on AI in EducationCAIP: Inttl Conf on Comp. Analysis of Images and PatternsCSSAC: Cognitive Science Society Annual ConferenceECCV: European Conference on Computer VisionEAI: European Conf on AIEML: European Conf on Machine LearningGP: Genetic Programming ConferenceIAAI: Innovative Applications in AIICIP: Intl Conf on Image ProcessingICNN/IJCNN: Intl (Joint) Conference on Neural NetworksICPR: Intl Conf on Pattern RecognitionICDAR: International Conference on Document Analysis and RecognitionICTAI: IEEE conference on Tools with AIAMAI: Artificial Intelligence and MathsDAS: International Workshop on Document Analysis SystemsWACV: IEEE Workshop on Apps of Computer VisionCOLING: International Conference on Computational LiguisticsEMNLP: Empirical Methods in Natural Language ProcessingRank 3:PRICAI: Pacific Rim Intl Conf on AIAAI: Australian National Conf on AIACCV: Asian Conference on Computer VisionAI*IA: Congress of the Italian Assoc for AIANNIE: Artificial Neural Networks in EngineeringANZIIS: Australian/NZ Conf on Intelligent Inf. SystemsCAIA: Conf on AI for ApplicationsCAAI: Canadian Artificial Intelligence ConferenceASADM: Chicago ASA Data Mining Conf: A Hard Look at DMEPIA: Portuguese Conference on Artificial IntelligenceFCKAML: French Conf on Know. Acquisition & Machine LearningICANN: International Conf on Artificial Neural NetworksICCB: International Conference on Case-Based ReasoningICGA: International Conference on Genetic AlgorithmsICONIP: Intl Conf on Neural Information ProcessingIEA/AIE: Intl Conf on Ind. & Eng. Apps of AI & Expert SysICMS: International Conference on Multiagent SystemsICPS: International conference on Planning SystemsIWANN: Intl Work-Conf on Art & Natural Neural NetworksPACES: Pacific Asian Conference on Expert SystemsSCAI: Scandinavian Conference on Artifical IntelligenceSPICIS: Singapore Intl Conf on Intelligent SystemPAKDD: Pacific-Asia Conf on Know. Discovery & Data MiningSMC: IEEE Intl Conf on Systems, Man and CyberneticsPAKDDM: Practical App of Knowledge Discovery & Data MiningWCNN: The World Congress on Neural NetworksWCES: World Congress on Expert SystemsINBS: IEEE Intl Symp on Intell. in Neural \& Bio SystemsASC: Intl Conf on AI and Soft ComputingPACLIC: Pacific Asia Conference on Language, Information and Computation ICCC: International Conference on Chinese ComputingOthers:ICRA: IEEE Intl Conf on Robotics and AutomationNNSP: Neural Networks for Signal ProcessingICASSP: IEEE Intl Conf on Acoustics, Speech and SPGCCCE: Global Chinese Conference on Computers in EducationICAI: Intl Conf on Artificial IntelligenceAEN: IASTED Intl Conf on AI, Exp Sys & Neural NetworksWMSCI: World Multiconfs on Sys, Cybernetics & InformaticsAREA: Hardware and ArchitectureRank 1:ASPLOS: Architectural Support for Prog Lang and OSISCA: ACM/IEEE Symp on Computer ArchitectureICCAD: Intl Conf on Computer-Aided DesignDAC: Design Automation ConfMICRO: Intl Symp on MicroarchitectureHPCA: IEEE Symp on High-Perf Comp ArchitectureRank 2:FCCM: IEEE Symposium on Field Programmable Custom Computing Machines SUPER: ACM/IEEE Supercomputing ConferenceICS: Intl Conf on SupercomputingISSCC: IEEE Intl Solid-State Circuits ConfHCS: Hot Chips SympVLSI: IEEE Symp VLSI CircuitsISSS: International Symposium on System SynthesisDATE: IEEE/ACM Design, Automation & Test in Europe ConferenceRank 3:ICA3PP: Algs and Archs for Parall ProcEuroMICRO: New Frontiers of Information TechnologyACS: Australian Supercomputing ConfUnranked:Advanced Research in VLSIInternational Symposium on System SynthesisInternational Symposium on Computer DesignInternational Symposium on Circuits and SystemsAsia Pacific Design Automation ConferenceInternational Symposium on Physical DesignInternational Conference on VLSI DesignAREA: ApplicationsRank 1:I3DG: ACM-SIGRAPH Interactive 3D GraphicsSIGGRAPH: ACM SIGGRAPH ConferenceACM-MM: ACM Multimedia ConferenceDCC: Data Compression ConfSIGMETRICS: ACM Conf on Meas. & Modelling of Comp SysSIGIR: ACM SIGIR Conf on Information RetrievalPECCS: IFIP Intl Conf on Perf Eval of Comp \& Comm SysWWW: World-Wide Web ConferenceRank 2:EUROGRAPH: European Graphics ConferenceCGI: Computer Graphics InternationalCANIM: Computer AnimationPG: Pacific GraphicsIEEE-MM: IEEE Intl Conf on Multimedia Computing and SysNOSSDAV: Network and OS Support for Digital A/VPADS: ACM/IEEE/SCS Workshop on Parallel \& Dist Simulation WSC: Winter Simulation ConferenceASS: IEEE Annual Simulation SymposiumMASCOTS: Symp Model Analysis \& Sim of Comp \& Telecom Sys PT: Perf Tools - Intl Conf on Model Tech \& Tools for CPENetStore - Network Storage SymposiumRank 3:ACM-HPC: ACM Hypertext ConfMMM: Multimedia ModellingDSS: Distributed Simulation SymposiumSCSC: Summer Computer Simulation ConferenceWCSS: World Congress on Systems SimulationESS: European Simulation SymposiumESM: European Simulation MulticonferenceHPCN: High-Performance Computing and NetworkingGeometry Modeling and ProcessingWISEDS-RT: Distributed Simulation and Real-time ApplicationsIEEE Intl Wshop on Dist Int Simul and Real-Time ApplicationsUn-ranked:DVAT: IS\&T/SPIE Conf on Dig Video Compression Alg \& Tech MME: IEEE Intl Conf. on Multimedia in EducationICMSO: Intl Conf on Modelling, Simulation and OptimisationICMS: IASTED Intl Conf on Modelling and SimulationAREA: System TechnologyRank 1:SIGCOMM: ACM Conf on Comm Architectures, Protocols & Apps INFOCOM: Annual Joint Conf IEEE Comp & Comm SocSPAA: Symp on Parallel Algms and ArchitecturePODC: ACM Symp on Principles of Distributed ComputingPPoPP: Principles and Practice of Parallel ProgrammingMassPar: Symp on Frontiers of Massively Parallel ProcRTSS: Real Time Systems SympSOSP: ACM SIGOPS Symp on OS PrinciplesSOSDI: Usenix Symp on OS Design and ImplementationCCS: ACM Conf on Comp and Communications SecurityIEEE Symposium on Security and PrivacyMOBICOM: ACM Intl Conf on Mobile Computing and Networking USENIX Conf on Internet Tech and SysICNP: Intl Conf on Network ProtocolsOPENARCH: IEEE Conf on Open Arch and Network ProgPACT: Intl Conf on Parallel Arch and Compil TechRank 2:CC: Compiler ConstructionIPDPS: Intl Parallel and Dist Processing SympIC3N: Intl Conf on Comp Comm and NetworksICPP: Intl Conf on Parallel ProcessingICDCS: IEEE Intl Conf on Distributed Comp SystemsSRDS: Symp on Reliable Distributed SystemsMPPOI: Massively Par Proc Using Opt InterconnsASAP: Intl Conf on Apps for Specific Array ProcessorsEuro-Par: European Conf. on Parallel ComputingFast Software EncryptionUsenix Security SymposiumEuropean Symposium on Research in Computer SecurityWCW: Web Caching WorkshopLCN: IEEE Annual Conference on Local Computer NetworksIPCCC: IEEE Intl Phoenix Conf on Comp & CommunicationsCCC: Cluster Computing ConferenceICC: Intl Conf on CommRank 3:MPCS: Intl. Conf. on Massively Parallel Computing SystemsGLOBECOM: Global CommICCC: Intl Conf on Comp CommunicationNOMS: IEEE Network Operations and Management SympCONPAR: Intl Conf on Vector and Parallel ProcessingVAPP: Vector and Parallel ProcessingICPADS: Intl Conf. on Parallel and Distributed SystemsPublic Key CryptosystemsIEEE Computer Security Foundations WorkshopAnnual Workshop on Selected Areas in CryptographyAustralasia Conference on Information Security and PrivacyInt. Conf on Inofrm and Comm. SecurityFinancial CryptographyWorkshop on Information HidingSmart Card Research and Advanced Application ConferenceICON: Intl Conf on NetworksIMSA: Intl Conf on Internet and MMedia SysNCC: Nat Conf CommIN: IEEE Intell Network WorkshopICME: Intl Conf on MMedia & ExpoSoftcomm: Conf on Software in Tcomms and Comp NetworksINET: Internet Society ConfWorkshop on Security and Privacy in E-commerceUn-ranked:PARCO: Parallel ComputingSE: Intl Conf on Systems EngineeringAREA: Programming Languages and Software EngineeringRank 1:POPL: ACM-SIGACT Symp on Principles of Prog LangsPLDI: ACM-SIGPLAN Symp on Prog Lang Design & ImplOOPSLA: OO Prog Systems, Langs and ApplicationsICFP: Intl Conf on Function ProgrammingJICSLP/ICLP/ILPS: (Joint) Intl Conf/Symp on Logic ProgICSE: Intl Conf on Software EngineeringFSE: ACM Conference on the Foundations of Software Engineering (inc: ESEC-FSE when held jointly)FM/FME: Formal Methods, World Congress/EuropeCAV: Computer Aided VerificationRank 2:CP: Intl Conf on Principles & Practice of Constraint ProgTACAS: Tools and Algos for the Const and An of SystemsESOP: European Conf on ProgrammingICCL: IEEE Intl Conf on Computer LanguagesPEPM: Symp on Partial Evalutation and Prog ManipulationSAS: Static Analysis SymposiumRTA: Rewriting Techniques and ApplicationsESEC: European Software Engineering ConfIWSSD: Intl Workshop on S/W Spec & DesignCAiSE: Intl Conf on Advanced Info System EngineeringITC: IEEE Intl Test ConfIWCASE: Intl Workshop on Cumpter-Aided Software EngSSR: ACM SIGSOFT Working Conf on Software ReusabilitySEKE: Intl Conf on S/E and Knowledge EngineeringICSR: IEEE Intl Conf on Software ReuseASE: Automated Software Engineering ConferencePADL: Practical Aspects of Declarative LanguagesISRE: Requirements EngineeringICECCS: IEEE Intl Conf on Eng. of Complex Computer SystemsIEEE Intl Conf on Formal Engineering MethodsIntl Conf on Integrated Formal MethodsFOSSACS: Foundations of Software Science and Comp StructRank 3:FASE: Fund Appr to Soft EngAPSEC: Asia-Pacific S/E ConfPAP/PACT: Practical Aspects of PROLOG/Constraint TechALP: Intl Conf on Algebraic and Logic ProgrammingPLILP: Prog, Lang Implentation & Logic ProgrammingLOPSTR: Intl Workshop on Logic Prog Synthesis & TransfICCC: Intl Conf on Compiler ConstructionCOMPSAC: Intl. Computer S/W and Applications ConfCSM: Conf on Software MaintenanceTAPSOFT: Intl Joint Conf on Theory & Pract of S/W DevWCRE: SIGSOFT Working Conf on Reverse EngineeringAQSDT: Symp on Assessment of Quality S/W Dev ToolsIFIP Intl Conf on Open Distributed ProcessingIntl Conf of Z UsersIFIP Joint Int'l Conference on Formal Description Techniques and Protocol Specification, Testing, And VerificationPSI (Ershov conference)UML: International Conference on the Unified Modeling LanguageUn-ranked:Australian Software Engineering ConferenceIEEE Int. W'shop on Object-oriented Real-time Dependable Sys. (WORDS)IEEE International Symposium on High Assurance Systems EngineeringThe Northern Formal Methods WorkshopsFormal Methods PacificInt. Workshop on Formal Methods for Industrial Critical SystemsJFPLC - International French Speaking Conference on Logic and Constraint ProgrammingL&L - Workshop on Logic and LearningSFP - Scottish Functional Programming WorkshopHASKELL - Haskell WorkshopLCCS - International Workshop on Logic and Complexity in Computer ScienceVLFM - Visual Languages and Formal MethodsNASA LaRC Formal Methods Workshop(1) FATES - A Satellite workshop on Formal Approaches to Testing of Software(1) Workshop On Java For High-Performance Computing(1) DSLSE - Domain-Specific Languages for Software Engineering(1) FTJP - Workshop on Formal Techniques for Java Programs(*) WFLP - International Workshop on Functional and (Constraint) Logic Programming(*) FOOL - International Workshop on Foundations of Object-Oriented Languages(*) SREIS - Symposium on Requirements Engineering for Information Security(*) HLPP - International workshop on High-level parallel programming and applications(*) INAP - International Conference on Applications of Prolog(*) MPOOL - Workshop on Multiparadigm Programming with OO Languages(*) PADO - Symposium on Programs as Data Objects(*) TOOLS: Int'l Conf Technology of Object-Oriented Languages and Systems(*) Australasian Conference on Parallel And Real-Time SystemsAREA: Algorithms and TheoryRank 1:STOC: ACM Symp on Theory of ComputingFOCS: IEEE Symp on Foundations of Computer ScienceCOLT: Computational Learning TheoryLICS: IEEE Symp on Logic in Computer ScienceSCG: ACM Symp on Computational GeometrySODA: ACM/SIAM Symp on Discrete AlgorithmsSPAA: ACM Symp on Parallel Algorithms and ArchitecturesPODC: ACM Symp on Principles of Distributed ComputingISSAC: Intl. Symp on Symbolic and Algebraic ComputationCRYPTO: Advances in CryptologyEUROCRYPT: European Conf on CryptographyRank 2:CONCUR: International Conference on Concurrency TheoryICALP: Intl Colloquium on Automata, Languages and ProgSTACS: Symp on Theoretical Aspects of Computer ScienceCC: IEEE Symp on Computational ComplexityWADS: Workshop on Algorithms and Data StructuresMFCS: Mathematical Foundations of Computer ScienceSWAT: Scandinavian Workshop on Algorithm TheoryESA: European Symp on AlgorithmsIPCO: MPS Conf on integer programming & comb optimization LFCS: Logical Foundations of Computer ScienceALT: Algorithmic Learning TheoryEUROCOLT: European Conf on Learning TheoryWDAG: Workshop on Distributed AlgorithmsISTCS: Israel Symp on Theory of Computing and SystemsISAAC: Intl Symp on Algorithms and ComputationFST&TCS: Foundations of S/W Tech & Theoretical CSLATIN: Intl Symp on Latin American Theoretical InformaticsRECOMB: Annual Intl Conf on Comp Molecular BiologyCADE: Conf on Automated DeductionIEEEIT: IEEE Symposium on Information TheoryAsiacryptRank 3:MEGA: Methods Effectives en Geometrie AlgebriqueASIAN: Asian Computing Science ConfCCCG: Canadian Conf on Computational GeometryFCT: Fundamentals of Computation TheoryWG: Workshop on Graph TheoryCIAC: Italian Conf on Algorithms and ComplexityICCI: Advances in Computing and InformationAWTI: Argentine Workshop on Theoretical InformaticsCATS: The Australian Theory SympCOCOON: Annual Intl Computing and Combinatorics ConfUMC: Unconventional Models of ComputationMCU: Universal Machines and ComputationsGD: Graph DrawingSIROCCO: Structural Info & Communication ComplexityALEX: Algorithms and ExperimentsALG: ENGG Workshop on Algorithm EngineeringLPMA: Intl Workshop on Logic Programming and Multi-Agents EWLR: European Workshop on Learning RobotsCITB: Complexity & info-theoretic approaches to biologyFTP: Intl Workshop on First-Order Theorem Proving (FTP)CSL: Annual Conf on Computer Science Logic (CSL)AAAAECC: Conf On Applied Algebra, Algebraic Algms & ECC DMTCS: Intl Conf on Disc Math and TCSUn-ranked:Information Theory WorkshopAREA: Data BasesRank 1:SIGMOD: ACM SIGMOD Conf on Management of DataPODS: ACM SIGMOD Conf on Principles of DB SystemsVLDB: Very Large Data BasesICDE: Intl Conf on Data EngineeringICDT: Intl Conf on Database TheoryRank 2:SSD: Intl Symp on Large Spatial DatabasesDEXA: Database and Expert System ApplicationsFODO: Intl Conf on Foundation on Data OrganizationEDBT: Extending DB TechnologyDOOD: Deductive and Object-Oriented DatabasesDASFAA: Database Systems for Advanced ApplicationsCIKM: Intl. Conf on Information and Knowledge ManagementSSDBM: Intl Conf on Scientific and Statistical DB MgmtCoopIS - Conference on Cooperative Information SystemsER - Intl Conf on Conceptual Modeling (ER)Rank 3:COMAD: Intl Conf on Management of DataBNCOD: British National Conference on DatabasesADC: Australasian Database ConferenceADBIS: Symposium on Advances in DB and Information SystemsDaWaK - Data Warehousing and Knowledge DiscoveryRIDE WorkshopIFIP-DS: IFIP-DS ConferenceIFIP-DBSEC - IFIP Workshop on Database SecurityNGDB: Intl Symp on Next Generation DB Systems and AppsADTI: Intl Symp on Advanced DB Technologies and IntegrationFEWFDB: Far East Workshop on Future DB SystemsMDM - Int. Conf. on Mobile Data Access/Management (MDA/MDM)ICDM - IEEE International Conference on Data MiningVDB - Visual Database SystemsIDEAS - International Database Engineering and Application SymposiumOthers:ARTDB - Active and Real-Time Database SystemsCODAS: Intl Symp on Cooperative DB Systems for Adv AppsDBPL - Workshop on Database Programming LanguagesEFIS/EFDBS - Engineering Federated Information (Database) SystemsKRDB - Knowledge Representation Meets DatabasesNDB - National Database Conference (China)NLDB - Applications of Natural Language to Data BasesKDDMBD - Knowledge Discovery and Data Mining in Biological Databases Meeting FQAS - Flexible Query-Answering SystemsIDC(W) - International Database Conference (HK CS)RTDB - Workshop on Real-Time DatabasesSBBD: Brazilian Symposium on DatabasesWebDB - International Workshop on the Web and DatabasesWAIM: Interational Conference on Web Age Information Management(1) DASWIS - Data Semantics in Web Information Systems(1) DMDW - Design and Management of Data Warehouses(1) DOLAP - International Workshop on Data Warehousing and OLAP(1) DMKD - Workshop on Research Issues in Data Mining and Knowledge Discovery (1) KDEX - Knowledge and Data Engineering Exchange Workshop(1) NRDM - Workshop on Network-Related Data Management(1) MobiDE - Workshop on Data Engineering for Wireless and Mobile Access(1) MDDS - Mobility in Databases and Distributed Systems(1) MEWS - Mining for Enhanced Web Search(1) TAKMA - Theory and Applications of Knowledge MAnagement(1) WIDM: International Workshop on Web Information and Data Management(1) W2GIS - International Workshop on Web and Wireless Geographical Information Systems * CDB - Constraint Databases and Applications* DTVE - Workshop on Database Technology for Virtual Enterprises* IWDOM - International Workshop on Distributed Object Management* IW-MMDBMS - Int. Workshop on Multi-Media Data Base Management Systems* OODBS - Workshop on Object-Oriented Database Systems* PDIS: Parallel and Distributed Information SystemsAREA: MiscellaneousRank 1:Rank 2:AMIA: American Medical Informatics Annual Fall SymposiumDNA: Meeting on DNA Based ComputersRank 3:MEDINFO: World Congress on Medical InformaticsInternational Conference on Sequences and their ApplicationsECAIM: European Conf on AI in MedicineAPAMI: Asia Pacific Assoc for Medical Informatics ConfSAC: ACM/SIGAPP Symposium on Applied ComputingICSC: Internal Computer Science ConferenceISCIS: Intl Symp on Computer and Information SciencesICSC2: International Computer Symposium ConferenceICCE: Intl Conf on Comps in EduEd-MediaWCC: World Computing CongressPATAT: Practice and Theory of Automated TimetablingNot Encouraged (due to dubious referee process):International Multiconferences in Computer Science -- 14 joint int'l confs.SCI: World Multi confs on systemics, sybernetics and informaticsSSGRR: International conf on Advances in Infrastructure for e-B, e-Edu and e-Science and e-MedicineIASTED conferences以下是期刊:IEEE/ACM TRANSACTIONS期刊系列一般都被公认为领域顶级期刊,所以以下列表在关于IEEE/ACM TRANSACTIONS的分类不一定太准确。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
AbstractThis paper presents a modular modelling methodology to formulate the timing behaviour of real-time distributed component-based applications. It allows to build real-time models of the platform resources and software components,which are reusable and independent of the applications that use them. The proposed methodology satisfies the completeness, opacity and composability properties,required to ensure that the complete real-time model of an application, able to predict its temporal behaviour by schedulability analysis or simulation, may be assembled by composition of the real-time models of its constituent parts.These real-time models present a dual descriptor/instance based nature. A class of component, independent of any application, is modelled as a parameterized class-type descriptor, which describes its inherent temporal behaviour and includes references to the real-time models of other hardware/software modules that it requires. An instance of the component in a concrete application context is modelled by an instance-type model, which is generated by assigning concrete values to the parameters and unsolved references of its corresponding descriptor. Instances are formed and combined by automatic tools to build complete analysis models for each specific real-time situation.1.Introduction 1The real-time model of a software application is an abstraction that holds all the qualitative and quantitative information needed to predict/evaluate its timing behav-iour. It is used by designers to annotate timing require-ments in the specification phase, to reason about the prospective architecture during design phases and to certify its schedulability when the solution is to be validated. This work elaborates a modelling methodology founded on the conceptual model known as the "Transactional Model"[1][2], used for analysis, specification, and design of real-time systems. A number of tools and techniques for sched-ulability analysis and response time calculation have beenproposed for it [3][4], and its fundaments are referenced by the synchronization protocols and scheduling policies used in the vast majority of real-time as well as general purposes operating systems [5]. Besides, the importance of the trans-actional model as a reference for analysis may also be noted by looking at the underlying model of the “UML profile for Schedulability, Performance and Time” (SPT),current OMG standard for modelling and analysis of real-time systems [6]. The transactional methodology models a real-time application by two complementary descriptions:a) Control flow (transactional) model: It is a reactive model, which describes the application as a set of concur-rent real-time transactions, which are sequences of activi-ties that are triggered in response to external or timed events. A transaction is described by its causal flow of activities, the generation pattern of the triggering events,and the timing requirements that must be met. An activity describes the amount of processing capacity that is required to perform the duty that it has associated. There is no direct activation or execution flow dependency between activities in different transactions; they only interact by sharing the processing-resources and the mutually exclu-sive passive resources.b) Resources contention model: It describes the active and passive resources that are used by the activities in a mutually exclusive way, showing characteristics like their capacity, overheads, access protocols or scheduling poli-cies. It is used to evaluate the blocking time in the access to passive synchronization resources or while contending for active resources like processors or networks.The information in the transactional model of a real-time application tend to be complex, therefore, tool support is required for its processing and management, and useful to exploit it effectively for analysis and design.Traditionally, the architecture of real-time applications has followed straightforwardly the transactional model,and they have been programmed with bare RTOS services.Currently, the increasing complexity and evolution of real-time applications domains, and the necessity for managing the software production, are pushing the introduction of component-based strategies in the construction of OS, mid-dleware, and applications with real-time constraints.1.This work has been funded by the Comisión Interministerial de Ciencia y Tecnología of the Spanish Government under grant TIC2002-04123-C03-02*Post-doctoral internship in the Commissariat à l’Energie Atomic , CEA Saclay, DRT/DTSI/SOL/L-LSP, F-91191, Gif-sur-Yvette Cedex, FranceReal-Time Modelling of Distributed Component-based ApplicationsPatricia López, Julio L. Medina* and José M. DrakeDepartamento de Electrónica y Computadores, Universidad de Cantabria, 39005-Santander, SP AIN{lopezpa, medinajl, drakej}@unican.esThe “componentization” is a structural pattern, which in principle is independent of the real-time design process, but, since it introduces deep changes in the development methodology, it interferes with the methods used in the real-time design. Traditional real-time design methodolo-gies [7][8] conceive applications as concurrent sets of transactions in a reactive paradigm, and it is in a later phase when the code is organized in modules following some domain criteria, such as objects, tasks or subsystems. On the contrary, component-based systems are design using reusable modules selected from catalogues in accordance with the required functionality. It is later, in refinement phases, when control flow lines are identified and associ-ated to threads, being not unique the concurrency model that can be obtained. Hence, an issue to consider in the component-based design strategies is the compatibility between the structural (static) point of view, in which oper-ations are identified as services of instances of compo-nents, and the reactive (dynamic) one, in which the activities (invocation of operations) are organized in threads, tasks or processes [9][10].A modelling methodology used to describe real-time applications that are designed using component-based tech-niques still needs to be oriented to describe its reactive transactional model, but it must also use modelling con-tainer elements that may be identified with its components structure. For this reason, it has to bring elements to formu-late the real-time model of a component as a self-contained set of abstractions and data that describe the timing and synchronization characteristics inherent to its own code and nature, and complete enough to build its corresponding part in the real-time model of any application that may use it. The modelling methodology must also offer the compos-ability properties required to build the complete real-time model of the application using the models of its constituent components, in analogy to the composition of the applica-tion code with the code of the components used.Previous work [11][12] has proposed MAST (Modelling and Analysis Suite for Real-Time Applications) as a meth-odology for the modelling and analysis of real-time distrib-uted systems using the transactional model, which is compatible with the analysis approach proposed by SPT [6]. A characteristic of MAST that makes it specially use-ful to model component-based applications is that it formu-lates the model in three sections: the logical part, which model the processing capacity and synchronization ele-ments required by the software modules; the platform used, which models the processing capacity and resources that are available to the system; and the real-time situations, which describe the way the system uses the resources in each mode of operation in response to the workload imposed. This work describes at conceptual level the strat-egy proposed to get the composability of real-time models. The meta-modelling approach followed is an extension of the MAST methodology, called CBSE-MAST, but the con-cepts and solutions brought are directly usable in any meth-odology derived from the SPT standard [6]. Like [17], CBSE-MAST uses a behavioural/resource decomposition, but it brings an explicit concurrency model, and uses holis-tic analysis techniques to target distributed systems.The paper is organized as follows, Section 2 shows the basic concepts and the metamodel that defines the set of available modelling elements. Section 3 presents as an example a simple real-time distributed application that will serve to illustrate the usage of the methodology. Section 4 describes relevant characteristics of the structure of soft-ware component descriptors. Section 5 describes the way real-time analysis models are generated for the real-time situations of an application. Section 6 presents some of the tools used to compose, analyse and design the application using the proposed methodology. Finally, Section 7 sum-marizes our conclusions.2.“RT-Model_Descriptor” and “RT-Model_Instance” conceptsRT-Model_Descriptor and RT-Model_Instance are the key concepts of the real-time modelling methodology described in this work:•An RT-Model_Descriptor is an abstract modelling entity that represents a generic and parameterized descriptor. It is used to describe the real-time model of any type of resource or service in the system. It constitutes a parame-terized template that includes the semantic and quantita-tive information of all the aspects that are inherent to the component and affect its real-time behaviour. The infor-mation that a descriptor provides is independent of the application in which the component is used, the platform in which it is executed, and the behaviour of other com-ponents that it requires to implement its functionality. •An RT-Model_Instance is a modelling entity that repre-sents a concrete final model of a single instance of a component, resource or service of the system, in a partic-Figure 1. Core classes of the metamodelular application. In the model of a real-time situation, each RT-Model_Instance object is declared in reference to the corresponding RT-Model_Descriptor, which defines its nature and semantics, assigning concrete val-ues or instances to all the parameters, attributes and ref-erences it has.Figure 1 shows the root classes of the meta-model of the proposed real-time models. RT-Model_Descriptor and RT-Model_Instance are high level concepts used to support notonly the real-time modelling of software components, and hardware/software modules of the platform (RT-Component_Descriptor and RT-Component_Instance), but also the modelling of any other basic element used to describe the internal nature of a component (RT-Element _Descriptor and RT-Element_Instance), as well as the serv-ices that it offers (RT-Usage_Descriptor and RT-Usage-_Instance). The set of concrete classes that represent the modelling contructs used to describe the temporal behav-iour of all the elements that take part in the execution of an application are derived from them. A detailed description of the aspects that these elements model and the attributes that define their behaviour can be found in [12][13].The MAST modelling methodology has defined a wide range of basic modelling primitives to model real-time applications and, as it is shown in [14], they are implemen-tations of the entities proposed in the SPT profile [6]. These modelling primitives are classified in two groups:•Resources models: They model the behaviour of those elements of the application that relate to the available processing capacity, either because they provide it, or reduce it, or because they modify its usage due to mutual exclusion or synchronized access. Processors, Networks, Timers, Drivers, Schedulers, Scheduling Servers and Shared Resources are included in this group.•Usage models: They describe the information required for evaluating the timing behaviour of the activities exe-cuted in the application. They model the consumed processing capacity, or the resources required for execu-tion that may generate deadlocks or delays. This group includes Transactions, Jobs,Operations, Interfaces and Real-Time Situations.3.Application exampleTo illustrate the concepts that have been defined, a sim-ple example is proposed. It is a distributed real-time appli-cation that reads a set of digital signals, generating some alarm actions like playing a sound in a speaker and setting other digital lines, when a wrong state is detected. Figure 2 shows the logical model of the application, which is based on three types of software components:Agent: It is an active component that controls the con-current execution of multiple alarm checking tasks, using an independent thread for each one.IO_Card: It is a passive component that offers the I_Digital interface, which allows clients to read an input digital line (readState function) or set an output digital line (writeState procedure).SoundGenerator: It is a component that offers the I_Player interface, which allows clients to generate sounds (play procedure). It uses some digital lines to control the device that physically creates the sounds.Figure 3 shows the deployment of the carAlarm applica-tion, which is the one that will be modelled. The execution platform consists of two nodes, panelProcessor and engineProcessor, both use MaRTE OS as operating system and communicate through the localBus CAN bus. The RT_CORBA distribution services are used as middleware in this application. The components alarmControl of the type Agent, boardSpeaker of the type SoundGenerator, and boardPanel of the type IO_Card, run in panelProcessor and the components engineSensor and engineActuator, both of the type IO_Card, are executed in engineProcessor.The approach in this work proposes the elaboration of the real-time models in two phases. When the components are developed (or simply acquired) their real-time models are also elaborated and registered with their code and meta-Figure 2. Software architecture of the example application Figure 3. Platform architecture and application deploymentdata. Likewise, for the hardware and software platforms that are planned to be used, their real-time models must be formulated, validated and registered. Later, when a certain application is under development, the models of its real-time situations are elaborated and composed with instance models of the software components, and the platform resources and middleware that are part of the application. Figure 4 shows the set of descriptors and instances that take part in the modelling of the carAlarm application, whose corresponding deployment is shown in Figure 3. 4.RT-Component_Descriptors of softwarecomponentsAs far as the real-time model is concerned, a software component is a reusable module of application code (a function library, an RT-CORBA server, a CBSE-Compo-nent, etc.). Its RT-Model_Descriptor contains all the infor-mation that describes the timing behaviour of its offered services, the synchronization mechanisms that it uses to manage concurrency, and in the case of active components, the models of the transactions that it may introduce.In order to show the more relevant characteristics of a software component model, components are classified, in a non exclusive way, according to the following patterns:•Server component: Software component whose offered services are directly implemented inside its code, and can be invoked locally or remotely by other components. In the application example, SoundGenerator and IO_Card components correspond to this pattern.•Client component: Software component that makes use of other components services to implement its own offered services. Agent and SoundGenerator componentsmatch this pattern in the example.•Active component: Software component that can trigger transactions, since it receives and must respond to timed or external events. Agent and SoundGenerator compo-nents match this pattern in the example.The RT-Component_Descriptor of a component that implements a server pattern must declare the models of the services that it offers. Figure 5 shows a section of the RT-Component_Descriptor corresponding to an IO_Card server component. This section of the model describes the different timing behaviours that the writeState procedure may have:.•The simple operation localWriteState describes its execu-tion time (in the worst, best and average cases). Time is expressed normalized with respect to the speed of a cer-tain processor, taken as a reference one. The physical execution time is calculated taking into account the rela-tive speed of the processor in which the operation is exe-cuted. It also defines that for the procedure execution it is required exclusive access to the mutex resource, which uses the immediate ceiling protocol. The value AGGRE-GATED of the attribute tie indicates that there will be a mutex for each instance of the component. Its priority ceiling, @theMutexCeiling, is a parameter to which a concrete value must be assigned for each instance of theFigure 4. RT-Component_Descriptors and RT-Component_Instances of the exampleFigure 5. Section of the RT-Component_Descriptor ofan IO_Card componentcomponent. This model is sufficient when the procedure is invoked locally.•The asynchronous procedure call (APCOperation) writ-eState extends the model of the simple operation with the information required to model the timing behaviour of a remote invocation of the procedure. It describes only the information that is consequence of the procedure nature, like the messages length (due to the size of the argu-ments) and the overheads introduced by the marshalling and unmarshalling operations (used to serialize the argu-ments to send them through the network).@theHost is a parameter that references the model of the processor node in which the instance of the component is installed and executed, and it must be present in the real-time model of any software component. It allows to access the basic characteristics of the processor (processing speed, scheduler nature, timer resolution, etc.). Access to them is required by the tools that process the model in order to evaluate the response times of the transactions that use any of the services offered by the component.The RT-Component_Descriptor of a component that implements a client pattern, and consequently requires other components to implement its functionality, must include parametric references to the real-time models of these required server components. These references allow the tools to access the models of the server components in order to evaluate the response times of the services offeredby the client component. To consider the case in which the access to the server is remote, the descriptors include addi-tional parameters to refer to the communication network and protocol models used in the invocation of the service.Figure 6 shows a section of the RT-Component _Descriptor of an Agent component type. The parameter @usedSpeaker is defined to make reference to the model of the component to which the Agent will access with the role speaker. For the case in which the client and the server are in different processors, the descriptor includes parameters to refer to the communication network model (@theCom-mNetwork) and the communication middleware (@used-SpeakerAccess) used to invoke the service. A communication network model describes its bandwidth, the messages granularity, the characteristics of the sched-uler that manages messages transmission, the processing capacity required to the processors by the drivers, and the overhead due to synchronization protocol messages among nodes. The middleware model describes the sequence of activities that represents the internal code executed between the service invocation made by the client and the execution of the method in the server. This sequence has two alternative models, one for local invocations and another for remote calls.The RT-Component_Descriptor of a software compo-nent that corresponds to the active pattern contains parame-terized models of the transactions that the component will manage. Any element of a transaction can be declared as a parameter, which includes event triggering patterns, opera-tions, timing requirements, scheduling characteristics, etc. Figure 7 shows a section of the Agent component model with the description of the transaction that the componentFigure 6. Extract of the RT-Component_Descriptor of aclient type componentFigure 7. Declaration of a transaction in a RT-Component_Descripor of an active componentcan manage. Figure 8 shows its functionality.A transaction model defines a sequence of activities.This sequence is described using a reactive event-based model that holds its external triggering events patterns, the control flow dependencies between the activities, and the timing requirements that must be met. Each activity repre-sents the execution of a simple or composite operation defined in any of the components declared in the model,and indicates also the concurrency unit (SchedulingServer )in which the operation is to be performed. In the model of the generic transaction ControlAlarmTask , declared in component Agent , the external event startControlAlarm describes the periodicity and trigger frequency, the events ev2, ev3,.. represent the control flow dependencies, and the timing requirement relative to the transaction completion is indicated in the last event endControlAlarm . In the segment of the transaction model shown in Figure 7, two activities are modelled: ReadValue, whose operation is defined in the component with the role sensor (indicated with the parame-ter @theSensor.SensorAccess. rmt_readSensor ), and Eval-uateRes , whose operation, TestAlarm , is declared in the component itself.The transaction model has several parameters that must have concrete values assigned in the RT-Model_Instance declaration. For example, @theSensor is the parameter that references the concrete instance of the server component that is used in the transaction with the role sensor, @alarm-Period determines both the invocation period and the dead-line that must be met, and @controlAlarmPriority defines the scheduling priority of the SchedulingServer in which the operations are executed.5.Formulation of the real-time model of an applicationThe first phase of modelling corresponds to identify the different real-time situations in which the application can operate. Each real-time situation represents a specific oper-ation mode of the system, and it consists of a configuration and static deployment of component instances, for whichreal-time requirements have been defined. For each real-time situation a complete and independent real-time analy-sis model is generated, and schedulability analysis or response time estimation tools are applied to these final models.Formulating the real-time model of a real-time situation implies two tasks, the first has an structural nature and involves collecting and linking all the RT-Model_Instances that describe the behaviour of the software and hardware elements that take part in the application execution. The second comprises modelling the real-time situation from the reactive point of view, for which it is necessary to define the application workload and the timing require-ments that the application must meet.From the structural point of view, the organization of instances in a real-time model follows the structure that the application has, regarding the components of which it is build up. Figure 9 shows the elements that take part in the real-time model of an application:•For each hardware or software resource of the executionplatform, the corresponding RT-Model_Instance must be instantiated, which includes the models of communica-tion nodes (Processors, timers, schedulers), communica-tion networks (networks, schedulers, drivers) and middleware elements (remote access resources, brokers,etc.). These instances form the RT_Platform_Model.•For each component that takes part in the application, theRT-Model_Instance that describes its temporal behaviour is instantiated. This set of instances form the RT_Logical_Model.•All the links that each instance requires to get access tothe other instances on which its model depends, must be established according to the configuration and deploy-ment of the application.The process of instantiating the RT-Model_Instance of a software component or a platform resource consists of tak-ing the reference to its corresponding RT-Model_Descrip-Figure 8. Alarm transaction managed by a component ofthe Agent typeFigure 9. Elements of the real-time model of an applicationtor, and considering the application context, assigning concrete values to its parameters.The workload in the real-time model of an application is determined by the set of transactions that its active compo-nents declare. The activation patterns that trigger them may be deterministic or defined through the statistical distribu-tion of the interarrival times between consecutive trigger-ing events. They also provide references for defining the global timing requirements.There are two types of transaction instances. On the one hand, those defined as <<Aggregated>> are inherent to the model of the component and are automatically attached to its instance model, so the designer do not have to declare them explicitly in the real-time situation model. On the other hand, those transactions that depend on the applica-tion workload, as a consequence of the input data or the application configuration, are defined as <<Declared>> in the active component models. The number of instances of these transactions present in the system and the concrete values assigned to their parameters must be explicitly established by the designer in the real-time situation model.6.Analysis and design toolsThe real-time modelling methodology proposed is reus-ability and composability oriented, and the internal organi-zation of the models reflects the structure of the modules which the application has been designed with. In order to structure the timing information of the system in the way that is needed for the analysis and design of the application, these models have to be transformed to a purely transac-tional formulation, which is compatible with the techniques used for schedulability analysis. As it is shown in Figure 10, the tool RT_Model_Component_Compiler has been developed to generate this transactional model of the appli-cation. It takes as inputs the RT-Model_Instance that repre-sents a concrete and complete model of the application in a particular real-time situation, and all the RT-Model_Descriptors that are referenced in it, which are stored in the component repository. All this models are for-mulated as text files with XML tagged formats that follow the meta-models defined and their corresponding Schemas.The transactional model generated by this tool follows the MAST methodology. The modelling resources cur-rently defined in MAST are able to model most of the real-time programming features included in real-time operating systems and languages, like POSIX.13 and the real-time and distributed Annexes of Ada95.Figure 9 shows some of the tools included in the MAST environment that help in the development of real-time applications. This set of tools allow the designer to opti-mize the values of the scheduling parameters in order to adapt the application to the platform characteristics, and evaluate its schedulability:•Tools for automatic priority assignment: In monoproc-essor systems to assign priorities to the different threads used in the transactions, the tool makes the assignment using Deadline Monotonic technique[15] or some of its extensions. In multiprocessor and distributed system, pri-ority assignment is more complex because of the strong interconnection among the response times of different resources, and because the number of priorities that must be decided is very high. In this case, it is necessary not only to assign a priority to each concurrency unit in the application, but for each remote invocation between components of different nodes three additional priorities has to be defined: one for the message that makes de invocation, one for the remote process that executes it and another for the message that returns the results of the invocation. For multiprocessor systems the tool uses the HOPA algorithm, which is an optimization algorithm based on the distribution of the end-to-end or global deadlines of each transaction among the different actions that compose that transaction [16]•Tools for schedulability analysis: These tools allow to verify if the selected platform has capacity enough to execute de system in a way that all the activities sched-uled in the application meet their real-time requirements. The tools can be applied to both monoprocessor and dis-tributed systems, and using different scheduling policies, like fixed priority, EDF, or a combination of both.•Tools for slack calculation: These tools allow to calcu-late the percentage by which the execution time of theFigure 10. Analysis and design tools。