o ware ro esslona - sinhgad institutes€¦ · o ware ro esslona volume fourteen • issue two •...
TRANSCRIPT
o warero esslona
VOLUME FOURTEEN • ISSUE TWO • MARCH 2012
Plan for Success, Model the Cost of QualityWilliam R. Nichols
Agile Quality Management TechniquesJames M. Jamieson and M. Hosein Fallah
Investigation of the Relationships Between theSoftware Quality Models of the ISO 9126 Standard:An Empirical Study Using the Taguchi MethodLaila Cheikhi and Alain Abran
A Step Towards Software Reliability PredictionUsing Support Vector Machine (SVM)Pradeep Kumar and Yogesli Singh
mlASQ
The Global Voice of Quolity'"
www.asq.org
Volume 46, Number 1January 2012
Published by the Association for Computing MachinerySpecial/nterest Group on Operating Systems
OPERATINGSYSTEMS
•review
TABLE OF CONTENTS
SPECIALTOPIC Best Papers from LADIS 2011Fifth Workshop on Large-Scale Distributed Systems and Middleware
1 Summary of the Sth Workshop on Large-Scale Distributed Systems and Middleware (LADIS2011)Luis Rodrigues (lNESC-ID),Divy Agrawal (University of California at Santa Barbara), Ymir Vigfusson (Reykjavik University),Gregory Chockler (IBM Research, Haifa)
4 Microsharding: A Declarative Approach to Support Elastic OLTPWorkloadsJunichi Tatemura, Oliver Po,Hakon Haaqumus (NECLaboratories America)
12 GLADE:A Scalable Framework for Efficient AnalyticsFlorin Rusu (University of California, Merced), Alin Dobra (University of Florida)
19 Towards Scalable Array-Oriented Active Storage: the Pyramid ApproachViet-Trung Tran (ENSCachan - Brittany), Bogdan Nicolae, Gabriel Antoniu (INRIA)
26 CIRCUMFLEX:A Scheduling Optimizer for MapReduce Workloads With Shared ScansJoel Wolf (IBM TJ. Watson), Andrey Balm in (IBM Almaden), Deepak Rajan (Lawrence Livermore Labs), Kirsten Hildrum, RohitKhandekar (IBM TJ. Watson), Sujay Parekh (Bank of America), Kun-Lung Wu (IBM TJ. Watson), Rares Vernica (HP Laboratories)
33 Commensal Cuckoo: Secure Group Partitioning for Large-Scale ServicesSiddhartha Sen,Michael J. Freedman (Princeton University)
40 Adaptive and Dynamic Funnel Replication in CloudsGuy Laden, Roie Melamed (IBM Research Haifa), Ymir Vigfusson (School of CS,Reykjavik)
47 From Paxosto CORFU:A Flash-Speed Shared LogDahlia Malkhi, Mahesh Balakrishnan, John D. Davis, Vijayan Prabhakaran, Ted Wobber (Microsoft Research)
(Table of Contents continued on back cover)
Association forComputing Machinery
Advancing Computing as a Science & Profession
,bi
Association for Computing Machinery2 Penn Plaza, Suite 701New York, NY 10121-0701
NONPROFIT ORG.u.s. POSTAGE PAIDLEHIGH VALLEY. PAPERMIT NO. 369
III jllllLI rill III I' 1111, III' , II, , 11111111' II' 1111111' , , , , III' I 'II
166030500 EXPIRE 1111 022S JAN17S8 POOJARY106858 HAZELHURST DR # 7682HOUSTON TX 77043-3238
)/14/.2012
Iii 1111111111111 111I111752834
TABLE OF CONTENTS (continued)
SPECIALTOPIC Best Papers from SBESC2011Brazilian Symposium on Computing System Engineering
52 Brazilian Symposium on Computing System EngineeringAntonio Augusto Frohlich (UFSCJ,Leandro BussBecker (UFSC)
53 Evaluation of Compound System Calls in the Linux KernelElder Vicente, Rivalino Matia, Lucio Borges,Autran Macedo (Federal University of Ubetlandia)
64 Implementing OSComponents in Hardware using AOPTiago Roqerio Muck, Antonio Augusto Frohlich (Federal University of Santa Catarina), Michael Gernoth,Wolfgang Scntodet-Pteiksctun (Friedrich-Alexander University Erlangen-Nuremberg)
73 Support for EarlyVerification of Embedded Real-Time Systems through UML Models SimulationMarco A Wehrmeister, J060 G. Packer,Luis M Ceron (Santa Catarina State University)
82 Optimizing Quality of Service in Real-Time Systems under Energy ConstraintsRfad Nassiffe, Eduardo Camponogara (Federal University of Santa Catarina), George Lima (Federal University of Bahia)
INDIVIDUAL SUBMISSION
93 Report on the Third Workshop on Hot Topics in Software Upgrades (HotSWUp'll)Christopher MHayden (University of Maryland), lulian Neamtiu (University of California, Riverside)
JJFSC
MIXPaper from
responsible sources
www.fsc.org FSC® C1 02081
JOURNAL OF COMPUTER SCIENCE ANDApPLICATIONS
Volume 3, Number 2 (2011)
Contents
WISP: Computational Feasibility of UHF RFID Tags using ReSAlgorithmAnusha Linda Kostka
Data Security-Text based Digital SteganographyB. Vinod
Fuzzy Knowledge Acquisition from Text Documents throughOntology-Guided Text MiningMuhammad Abulaish
Comprehensive Study on Image Transformation Basing onMathematical MorphologyB.L.N. Phaneendra, D. Madhavi, Ch. Srividya and TL. Surekha
A Small Report on Network Security with Respective FirewallV Anantha Krishna and T Aruldoss Albert Victoire
A Survey on Distributed Page RankingManju Patel and Shweta Modi
Grid Data Mining for Genomics and Gridification of GenomicApplication (GENO Grid)S1. Saritha and P. Govinda Rajulu
Evaluation of Dense Two Frame Stereo Correspondence Algorithmto Define the Depth Cues from Imaging SensorsB. Vijayalakshmi, B. Sheelarani and N. Manoharan
85-89
91-98
99-106
107-113
115-122
123-130
131-138
139-148
The IUP Journal of
Computational MathematicsVol. V No.1 March 2012
Contents
Focus 5
A Note on the Solution of the Nearest Correlation
Matrix Problem by Von Neumann Matrix Divergence
S J( Mishra
7
Efficient Simulation of the Wishart Model 14
Pierre Gauthier and Dylan Possamai
Online PID Controller Tuning
Using Fuzzy Logic Controller
Elijah E Omtzegba, Stephen Bassi, Ejike C Anene and Usman U Abraham
59
Numerical Solution of Run-Up Flow Through a Pipe
with an Equilateral Triangular Cross-Section
S Ra]! Reddy
67
The Official Publication ofThe Embedded Systems Conferences and Embedded.com
Discriminatedunions
9
Debug real-timeSW with logic analyzer
19Managing multiple
processes in multicore27
Probing pointers34
THE OFFICIAL PUBLICATION OF THE EMBEDDED SYSTEMS CONFERENCES AND EMBEDDED.COM
Learn today. Design tomorrow .
••••EMBEDDED SYSTEMS DESIGNVOLUME 25, NUMBER 2MARCH 2012
Cover Feature:Tracing requithrough to ob
mentscode verificaf on
I
BY MARK PITCHFORDVerifying object code ~J!!:~!l1~~tt<and failure, qua!i·1~ndstandard doesn't re . e it or because it theoretically eats intoprofits is a surprising common practice. The author postu-lates that this practice i not only shortsighted but no longervalid.
19 Troubleshooting real·time softwareissues using a logic analyzerBY DAVID B. STEWART
This logic analyzer technique is a' power-tool for theembedded software engineer's toolbox.
28 Manage multiple processes and processorsin a deterministic multicore designBY CHRIS MAIN
How should processes running on different RTOSes communi-cate in multi-OS systems? The author suggests you can manageinter-process communications with global-object networking.
EMBEDDED SYSTEMS DESIGN (ISSN 1558-2493) print; (lSSN 1558-2507 PDF-electronic) is published 10 times (I year asfollows.:fall/Feb. March, April, May, JUlie,
lilly/August. Sept .• Oc., Nav, Dec. by the fE Times Group. 6fXJHarrison Street, 5tIJfloor, ~f! Prancisco; CA 94107, (415) 947-6IXXJ.Please direct advertisingalld editorialinqlliries 10 this address. SUBSCRIPTION RATE for the United Stales is $55 for 10 miles. Canoaian/Mexican orders must be accompanied by payment ill U.S. fimds with oddi-tionn! postage of $6 per year:All otherfondgll subscriptions I1lIl5tbe prepaid in u.s. fimds with additional poSliIgc 0[$15 per year for slIrJacemail and $4() p" year forairmail. POSTMASTER: Send nl/ cha"g~ to EMBEDDED SYSTEMS DESIGN, EE Times/ESD, PO Box #3609, Northbrook. IL 60065-3257, [email protected]. For cus-tomer service, lelephone toll-fru (847) 559-7597. Pleaseallowjour to six weeks for chnnge of uddress to MKeeffect. Periodicalsposlage paid at Sail Francisco, CA and rulditiOlln/mailing offices. EMBEDDED SYSTEMS DESIGN is a registered tmdemark (}\~rledby Ihe fJflM11 company, EE TImes Group. AU material pllblished ill EMBEDDED SYSTEMSDESIGN is copyright C 2010 by EE Times Group. All rigllts reserved. Reproduction ofm(lferifllllp~aring ill EMBEDDED SYSTEMS DESIGN isforbiddell without permission.
Accelerating Your Success!'
COLUMNSprogrammingpomters .Discriminated unionsBY DAN SAKS
Discriminated unions can be useful insome applications, but they also pro-vide insight into the advantages ofusing virtual functions.
9
break points 34Probing pointersBY JACK G. GANSSLE
The wrong probe can either cause yourcircuit to fail or even to physicallydestroy components. Here are some ofthe issues.
DEPARTMENTS#include 5Safety threats: from satellites topods in you pocketBY COLIN HOLLAND
DARPA's High-Assurance CyberMilitary Systems program is look-ing for a synthesizer capable ofproducing a machine-checkableproof that generated code satisfiesfunctional specifications as well assecurity and safety policies.
parity bit 7Open to interpretation
new products 33M2M and security
IN PERSONDesignWestiESC Silicon ValleyMarch 16-29,2012http://esc.eetimes.comlsiliconvalleyl
ONLINEwww.embedded.com
~ 100$12
5$9.5Malaysia MYR 19
SUBSCRIBER COPYNOT FOR RESALE
Sale and purchaseof this copy is illegal.
Karpagam Journal of Computer Sciencewww.karpagameducation.com
Volume: 06 Issue: 02 Jan. - Feb. 2012
CONTENTS PAGE NO.
1. Analysis of Visual Colour Perception using
EEG Spectral Features
Paulraj M P', Abdul Hamid Adom', Hema C R', Divakar Purushothaman'
74
2. Stationary and on-Stationary Vehicle Cabin Noise
Level Identification Using Spectral Composite Features
and Neural Networks
82
Paulraj M P, Sazali Yaacob, Allan Melvin Andrew
3. Fuzzy Logic Inference System for Voiced-Unvoiced-Silence
Classification of Malaysian English Isolated Words based on
Time-domain Features
93
Yusnita MA' Paulraj Mpc Sazali Yaacob' Shahriman ABc Satheesh Kumar Nataraj'
4. Fuzzy C-means Clustering Technique For Cancer Detection
In Ultrasound Images
Alameiumangai.N', D,: DeviShree ..F-
102
5. A Novel Parallel Architecture for Elliptic Curve Cryptography
Based on Modified Programmable Cellular Automata
B. MuthicKumar', S. Jeevananthan!
108
6. A Sequential Analysis based Approach in Wireless Sensor Networks
Punam Borah'
118
7. Data Reduction Techniques in Data Mining
AiAnbarasi, S. Santhosh Baboo
126
• ••••••••eolearning age magazineISSN 1474 - 5127published by Bizmedia Ltd
BIZM E 0 I A)
Bizmedia LtdLoddonParkFarm,New Bath RoadTwyford,ReadingRG109RYTel:+44 (0) 118 380 0350
Corporate Sponsor Subscriber:
eLearningNetwork
ADVERTISING SALES+44 (0) 118 380 0350
Account managerAdam [email protected]+44 (0) 118 380 0350
EDITORIAL ADDRESSe.learning age80/82 Chiswick High RoadLondonW4 1SYTel: +44 (0) 20 8995 [email protected]
[email protected]: +44 (0) 20 8995 9345
ReporterMargaret [email protected]
DesignerJane [email protected]
PublisherMelanieWilliamsTel: +44 (0) 20 8995 [email protected]
Advertising Be Subscription EnquiriesTel:+44 (0) [email protected]
MARCH 2012
EDITOR'S COMMENT
Hunting down apiece of the action
••••••••••••••••••••••••••••• 1•••CIVIL SERVICELEARNINGpromised to become fully functional by April 2012 and it looks on target to achieve thatpromise. CSL was created to centrally deliver all generic L&D for civil servants. www.civilservice,gov.ukllearning isalready working as a gateway to access e-Iearning, view online resources and book courses.
This promises to be nothing short of a revolution. The old system allowed duplication in procurement, havingover 200 contracts with providers, and including multiple contracts with the same provider charging differentrates. The product portfolio was equally bizarre, with 500 classroom courses available and 1,600 courses intotal. With such a forest of training it is no surprise development costs were being paid ceaselessly foressentially the same product, with daily delegate rates varying across contracts with the same supplier. Andwith that bewildering choice came underutilisation - many courses ran at between 20% and 40% of capacity.
Capita Workplace Services last month won a contract worth up to £250m to change all that. At the risk ofsounding cynical, dOing better than that doesn't sound overstretching: but there is one significant aspect which doespromise to represent a significant break from the past and does contain an element of challenge. The governmenthas made Capita agree to allow 51% of this contract to be delivered through open and competitive supply chain.
As was noted in the December/January leader, the key question is how the e-Iearning industry will takeadvantage of this switch. The government claims it has broken the myth that centralised procurement automaticallyexcludes small business by using Capita to run open competition with the results subject to scrutiny through audit.Inevitably there will be glitches but for now every e-Iearning company should be focussed on working out how itcan get its piece of the Civil Service learning action.Peter WilliamsEditor
02 NewsMassive government contract promises work forsmall e-Iearning suppliers
05 Awards NewsThe E-Learning Awards buzz builds already
06 Effective learningThe eLearning Network fights for e-Iearning tobe REMADE
07 ManagementJudging the impact of Apple's online learningtools
08 Project managementThe secrets of successful project delivery
10 Case studyHow BT Retail delivered award-winningcustomer excellence
12 Ringing bellsThe connection between learning managementand burglar alarms
17 StandardsRevised guidelines set to be published
18 E-Iearning communityWhy it is time to move to Wonderland
19 Job like mineUnicorn's Laura Hopper's challenge in buildingexciting financial services e-Iearning
20 Chalkface & diaryPassword problems and phone fears
~ ..• ;=:. •
~~:.-,
~--
14 Cover storyTeasing out the characteristics of the tope-Iearning performers
•••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••