Abstract
We have developed a new traffic measuring tool and applied it to the real-time simulation of a network. It monitors IP traffic on an ATM link and continuously transfers the length and timestamp of each IP packet to a post-processing system. The post-processing system receives the [...]Abstract
When developing real-time systems, the worst-case execution time (WCET) is a commonly used measure for predicting and analyzing program and system timing behavior. Such estimates should preferrably be provided by static WCET analysis tools. Their analysis is made difficult by features [...]Abstract
Processor simulators are important parts of processor design toolsets in which they are used to verify and evaluate the properties of the designed processors. While simulating architectures with independent function unit pipelines using simulation techniques that avoid the overhead [...]Abstract
Part 3: Computational Intelligence and Algorithms; International audience; Computational technologies under the domain of intelligent systems are expected to help the rapidly increasing traffic congestion problem in recent traffic management. Traffic management requires efficient [...]Abstract
To guarantee timeliness in hard real-time systems the knowledge of the worst-case execution time (WCET) for its time-critical tasks is mandatory. Accurate and correct WCET analysis for modern processor is a quite complex problem. Path analysis is required to identify a minimal set [...]Abstract
Micro-simulations for transport planning are becoming increasingly important in traffic simulation, traffic analysis, and traffic forecasting. In the last decades the shift from using typically aggregated data to more detailed, individual based, complex data (e.g. GPS tracking) andthe [...]Abstract
The article considers the active safety system of road freight transport. The stereoscopic computer vision is the core of the system. The article also describes the major algorithms of active safety and the accuracy characteristics of algorithms application. Document type: Part [...]Abstract
Part 2: CONTROL SYSTEMS SECURITY International audience Industrial control systems are cyber-physical systems that supervise and control physical processes in critical infrastructures such as electric grids, water and wastewater treatment plants, oil and natural gas pipelines, transportation [...]Abstract
Pipeline morphing is a simple but effective technique for reconfiguring pipelined FPGA designs at run time. By overlapping computation and reconfiguration, the latency associated with emptying and refilling a pipeline can be avoided. We show how morphing can be applied to linear and [...]