937 resultados para INFORMATION AND COMPUTING SCIENCES
Resumo:
Grid computing is an advanced technique for collaboratively solving complicated scientific problems using geographically and organisational dispersed computational, data storage and other recourses. Application of grid computing could provide significant benefits to all aspects of power system that involves using computers. Based on our previous research, this paper presents a novel grid computing approach for probabilistic small signal stability (PSSS) analysis in electric power systems with uncertainties. A prototype computing grid is successfully implemented in our research lab to carry out PSSS analysis on two benchmark systems. Comparing to traditional computing techniques, the gird computing has given better performances for PSSS analysis in terms of computing capacity, speed, accuracy and stability. In addition, a computing grid framework for power system analysis has been proposed based on the recent study.
Resumo:
The verification of information flow properties of security devices is difficult because it involves the analysis of schematic diagrams, artwork, embedded software, etc. In addition, a typical security device has many modes, partial information flow, and needs to be fault tolerant. We propose a new approach to the verification of such devices based upon checking abstract information flow properties expressed as graphs. This approach has been implemented in software, and successfully used to find possible paths of information flow through security devices.
Resumo:
Professional computing employment in Australia, as in most advanced economies, is highly sex segregated, reflecting well-rehearsed ideas about the masculinity of technology and computing culture. In this paper we are concerned with the processes of work organisation that sustain and reproduce this gendered occupational distribution, focusing in particular on differences and similarities in working-time arrangements between public and private sectors in the Australian context. While information technology companies are often highly competitive workplaces with individualised working arrangements, computing professionals work in a wide range of organisations with different regulatory histories and practices. Our goal is to investigate the implications of these variations for gender equity outcomes, using the public/private divide as indicative of different regulatory frameworks. We draw on Australian census data and a series of organisational case studies to compare working-time arrangements in professional computing employment across sectors, and to examine the various ways employees adapt and respond. Our analysis identifies a stronger ‘long hours culture’ in the private sector, but also underlines the rarity of part-time work in both sectors, and suggests that men and women tend to respond in different ways to these constraints. Although the findings highlight the importance of regulatory frameworks, the organisation of working time across sectors appears to be sustaining rather than challenging gender inequalities in computing employment.
Resumo:
A major requirement for pervasive systems is to integrate context-awareness to support heterogeneous networks and device technologies and at the same time support application adaptations to suit user activities. However, current infrastructures for pervasive systems are based on centralized architectures which are focused on context support for service adaptations in response to changes in the computing environment or user mobility. In this paper, we propose a hierarchical architecture based on active nodes, which maximizes the computational capabilities of various nodes within the pervasive computing environment, while efficiently gathering and evaluating context information from the user's working environment. The migratable active node architecture employs various decision making processes for evaluating a rich set of context information in order to dynamically allocate active nodes in the working environment, perform application adaptations and predict user mobility. The active node also utilizes the Redundant Positioning System to accurately manage user's mobility. This paper demonstrates the active node capabilities through context-aware vertical handover applications.