20 research outputs found

    The COMQUAD Component Container Architecture and Contract Negotiation

    Get PDF
    Component-based applications require runtime support to be able to guarantee non-functional properties. This report proposes an architecture for a real-time-capable, component-based runtime environment, which allows to separate non-functional and functional concerns in component-based software development. The architecture is presented with particular focus on three key issues: the conceptual architecture, an approach including implementation issues for splitting the runtime environment into a real-time-capable and a real-time-incapable part, and details of contract negotiation. The latter includes selecting component implementations for instantiantion based on their non-functional properties

    Low-Cost Deterministic C++ Exceptions for Embedded Systems

    Get PDF
    The C++ programming language offers a strong exception mechanism for error handling at the language level, improving code readability, safety, and maintainability. However, current C++ implementations are targeted at general-purpose systems, often sacrificing code size, memory usage, and resource determinism for the sake of performance. This makes C++ exceptions a particularly undesirable choice for embedded applications where code size and resource determinism are often paramount. Consequently, embedded coding guidelines either forbid the use of C++ exceptions, or embedded C++ tool chains omit exception handling altogether. In this paper, we develop a novel implementation of C++ exceptions that eliminates these issues, and enables their use for embedded systems. We combine existing stack unwinding techniques with a new approach to memory management and run-time type information (RTTI). In doing so we create a compliant C++ exception handling implementation, providing bounded runtime and memory usage, while reducing code size requirements by up to 82%, and incurring only a minimal runtime overhead for the common case of no exceptions.Postprin

    Risk of Adverse Cognitive or Behavioral Conditions and Psychiatric Disorders: Evidence Report

    Get PDF
    In April 2010, President Obama declared a space pioneering goal for the United States in general and NASA in particular. "Fifty years after the creation of NASA, our goal is no longer just a destination to reach. Our goal is the capacity for people to work and learn and operate and live safely beyond the Earth for extended periods of time, ultimately in ways that are more sustainable and even indefinite." Thus NASA's Strategic Objective 1.1 emerged as "expand human presence into the solar system and to the surface of Mars to advance exploration, science, innovation, benefits to humanity, and international collaboration" (NASA 2015b). Any space flight, be it of long or short duration, occurs in an extreme environment that has unique stressors. Even with excellent selection methods, the potential for behavioral problems among space flight crews remain a threat to mission success. Assessment of factors that are related to behavioral health can help minimize the chances of distress and, thus, reduce the likelihood of adverse cognitive or behavioral conditions and psychiatric disorders arising within a crew. Similarly, countermeasures that focus on prevention and treatment can mitigate the cognitive or behavioral conditions that, should they arise, would impact mission success. Given the general consensus that longer duration, isolation, and confined missions have a greater risk for behavioral health ensuring crew behavioral health over the long term is essential. Risk, which within the context of this report is assessed with respect to behavioral health and performance, is addressed to deter development of cognitive and behavioral degradations or psychiatric conditions in space flight and analog populations, and to monitor, detect, and treat early risk factors, predictors and other contributing factors. Based on space flight and analog evidence, the average incidence rate of an adverse behavioral health event occurring during a space mission is relatively low for the current conditions. While mood and anxiety disturbances have occurred, no behavioral emergencies have been reported to date in space flight. Anecdotal and empirical evidence indicate that the likelihood of an adverse cognitive or behavioral condition or psychiatric disorder occurring greatly increases with the length of a mission. Further, while cognitive, behavioral, or psychiatric conditions might not immediately and directly threaten mission success, such conditions can, and do, adversely impact individual and crew health, welfare, and performance

    Combining MAS and P2P Systems: The Agent Trees Multi-Agent System (ATMAS)

    Get PDF
    The seamless retrieval of information distributed across networks has been one of the key goals of many systems. Early solutions involved the use of single static agents which would retrieve the unfiltered data and then process it. However, this was deemed costly and inefficient in terms of the bandwidth since complete files need to be downloaded when only a single value is often all that is required. As a result, mobile agents were developed to filter the data in situ before returning it to the user. However, mobile agents have their own associated problems, namely security and control. The Agent Trees Multi-Agent System (AT-MAS) has been developed to provide the remote processing and filtering capabilities but without the need for mobile code. It is implemented as a Peer to Peer (P2P) network of static intelligent cooperating agents, each of which control one or more data sources. This dissertation describes the two key technologies have directly influenced the design of ATMAS, Peer-to-Peer (P2P) systems and Multi-Agent Systems (MAS). P2P systems are conceptually simple, but limited in power, whereas MAS are significantly more complex but correspondingly more powerful. The resulting system exhibits the power of traditional MAS systems while retaining the simplicity of P2P systems. The dissertation describes the system in detail and analyses its performance

    Combining MAS and P2P systems : the Agent Trees Multi-Agent System (ATMAS)

    Get PDF
    The seamless retrieval of information distributed across networks has been one of the key goals of many systems. Early solutions involved the use of single static agents which would retrieve the unfiltered data and then process it. However, this was deemed costly and inefficient in terms of the bandwidth since complete files need to be downloaded when only a single value is often all that is required. As a result, mobile agents were developed to filter the data in situ before returning it to the user. However, mobile agents have their own associated problems, namely security and control. The Agent Trees Multi-Agent System (AT-MAS) has been developed to provide the remote processing and filtering capabilities but without the need for mobile code. It is implemented as a Peer to Peer (P2P) network of static intelligent cooperating agents, each of which control one or more data sources. This dissertation describes the two key technologies have directly influenced the design of ATMAS, Peer-to-Peer (P2P) systems and Multi-Agent Systems (MAS). P2P systems are conceptually simple, but limited in power, whereas MAS are significantly more complex but correspondingly more powerful. The resulting system exhibits the power of traditional MAS systems while retaining the simplicity of P2P systems. The dissertation describes the system in detail and analyses its performance.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Rethinking the risk matrix

    Get PDF
    So far risk has been mostly defined as the expected value of a loss, mathematically PL (being P the probability of an adverse event and L the loss incurred as a consequence of the adverse event). The so called risk matrix follows from such definition. This definition of risk is justified in a long term “managerial” perspective, in which it is conceivable to distribute the effects of an adverse event on a large number of subjects or a large number of recurrences. In other words, this definition is mostly justified on frequentist terms. Moreover, according to this definition, in two extreme situations (high-probability/low-consequence and low-probability/high-consequence), the estimated risk is low. This logic is against the principles of sustainability and continuous improvement, which should impose instead both a continuous search for lower probabilities of adverse events (higher and higher reliability) and a continuous search for lower impact of adverse events (in accordance with the fail-safe principle). In this work a different definition of risk is proposed, which stems from the idea of safeguard: (1Risk)=(1P)(1L). According to this definition, the risk levels can be considered low only when both the probability of the adverse event and the loss are small. Such perspective, in which the calculation of safeguard is privileged to the calculation of risk, would possibly avoid exposing the Society to catastrophic consequences, sometimes due to wrong or oversimplified use of probabilistic models. Therefore, it can be seen as the citizen’s perspective to the definition of risk

    Information Governance Modularity in Open Data

    Get PDF

    Proceedings of the 9th European Conference on Innovation and Entrepreneurship

    Get PDF

    A Qualitative Approach to Spiral of Silence Research: Self-Censorship Narratives Regarding Environmental and Social Conflict

    Get PDF
    The purpose of this research is to seek narratives of self-censorship from in-depth interviews of 19 participants acquired through a purposive (criterion) sampling protocol. The primary research question driving this study is “What types of sanctions contribute to people choosing to self-censor their strongly held beliefs, values, and opinions.” Previous research conducted on the topic of self-censorship (generally under the rubric of the spiral of silence theory) has been predominantly quantitative and consideration of sanctions influencing self-censorship have been limited to fear of social isolation. I suggest that ostensibly important sanction variables have not been utilized within these existing frameworks. I anticipated that this research, by utilizing a qualitative framework, would reveal other sanctions that operate in the self-censorship decision calculus. I also expected that interviews would portray a broader, more complete picture of how self-censorship operates and the variables that contribute to the construct. Research expectations were partially met as new variables in regard to specific fears of sanctioning were identified. These variables should contribute to self-censorship theory and more specifically, the frequently researched “spiral of silence” theory of mass communication and could be tested in quantitative research to verify their validity. Future research in this vein might consider testing additional sanction variables as part of a quantitative study, continue to refine the definition of self-censorship, develop better strategies to locate and secure additional informants, and continue to utilize qualitative methods to probe further into self-censorship questions
    corecore