International ICST Conference on Simulation Tools and Techniques最新文献

筛选
英文 中文
Comparative study of LTE simulations with the ns-3 and the Vienna simulators LTE模拟与ns-3和Vienna模拟器的比较研究
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260782
Thiago Abreu, B. Baynat, Marouen Gachaoui, T. Jiménez, N. Nya
{"title":"Comparative study of LTE simulations with the ns-3 and the Vienna simulators","authors":"Thiago Abreu, B. Baynat, Marouen Gachaoui, T. Jiménez, N. Nya","doi":"10.4108/eai.24-8-2015.2260782","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260782","url":null,"abstract":"In this paper we compare two simulators: ns-3 and Vienna, in the context of LTE networks, on four basic scenarios for which well-known analytical results exist. These scenarios differentiate themselves by the nature of the traffic (data or voice) and by the number of sources (infinite or finite). Our goal is twofold. First, by confronting the results of the two simulators with exact results, we can assess the accuracy of both simulators and compare their efficiency. Second, and maybe more importantly, we want to compare the ease of handling and use of both simulators, and list the difficulties encountered in the context of the four basic scenarios, that will necessarily arise in more realistic simulated scenarios, and explain how we worked around the problems. We hope this comparison will help researchers who work on LTE networks to choose the simulator that best suits their needs.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Split and merge strategies for solving uncertain equations using affine arithmetic 用仿射算法求解不确定方程的分裂和合并策略
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260594
Oliver Scharf, M. Olbrich, E. Barke
{"title":"Split and merge strategies for solving uncertain equations using affine arithmetic","authors":"Oliver Scharf, M. Olbrich, E. Barke","doi":"10.4108/eai.24-8-2015.2260594","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260594","url":null,"abstract":"The behaviour of systems is determined by various parameters. Due to several reasons like e. g. manufacturing tolerances these parameters can have some uncertainties. Corner Case and Monte Carlo simulations are well known approaches to handle uncertain systems. They sample the corners and random points of the parameter space, respectively. Both require many runs and do not guarantee the inclusion of the worst case. As alternatives, range based approaches can be used. They model parameter uncertainties as ranges. The simulation outputs are ranges which include all possible results created by the parameter uncertainties. One type of range arithmetic is the affine arithmetic, which allows to maintain linear correlations to avoid over-approximation. An equation solver based on affine arithmetic has been proposed earlier. Unlike many other range based approaches it can solve implicit non-linear equations. This is necessary for analog circuit simulation. For large uncertainties the solver suffers from convergence problems. To overcome these problems it is possible to split the parameter ranges, calculate the solutions separately and merge them again. For higher dimensional systems this leads to excessive runtimes as each parameter is split. To minimize the additional runtime several split and merge strategies are proposed and compared using two analog circuit examples.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Targeted on-line data extraction with SystemXtract 目标在线数据提取与SystemXtract
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260916
Johannes Schützel, S. Stieber, C. Haubelt, A. Uhrmacher
{"title":"Targeted on-line data extraction with SystemXtract","authors":"Johannes Schützel, S. Stieber, C. Haubelt, A. Uhrmacher","doi":"10.4108/eai.24-8-2015.2260916","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260916","url":null,"abstract":"Complex system-leve simulation can produce large amounts of data, of which only portions may be of interest. When experimenting with hybrid prototypes, consisting of physi-cal and simulated components, data logs are generated and inspected in real-time. Storing full data logs would not only require much disk space, it would also require much effort to find special events and related system actions afterwards. Targeted on-line data extraction helps to instantly provide the data of interest. We present SystemXtract, a power-ful specification language and tool for on-line data extrac-tion, supporting origin-, value- and dynamic phase-based constrains on the data. The main contribution of this paper is to show how the language can be mapped to a graph-based processing architecture for executing data extraction as specified. Experiments show that the tool-induced over-head in computation time is insignificant and that the real-time execution of the hybrid prototype is not compromised, while the output is reduced to the interesting data.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114474537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Simulating LTE mobility management in presence of coverage holes with ns-3 利用ns-3模拟存在覆盖漏洞的LTE移动性管理
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260998
Zoraze Ali, N. Baldo, J. Mangues‐Bafalluy, L. Giupponi
{"title":"Simulating LTE mobility management in presence of coverage holes with ns-3","authors":"Zoraze Ali, N. Baldo, J. Mangues‐Bafalluy, L. Giupponi","doi":"10.4108/eai.24-8-2015.2260998","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260998","url":null,"abstract":"In this paper, we present our approach to simulate mobility management scenarios for LTE heterogeneous network deployments defined by challenging radio propagation scenarios, such as the presence of coverage holes. We focus on the LTE module of ns-3, which is also known as LENA. Our contribution is twofold. On one hand, we propose a set of new features for the LTE module, including a new model for simulating obstacles blocking the propagation of radio signals, and a handover model suitable for the offline evaluation of mobility management solutions. On the other hand, we describe in detail the setup of the simulation scenario, highlighting the challenges that we faced during the implementation and discussing the chosen configuration parameters. Finally, we present some simulation results that we obtained with the proposed approach.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127088162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hybrid simulation using SAHISim framework: a hybrid distributed simulation framework using waveform relaxation method implemented over the HLA and the functional mock-up interface 使用SAHISim框架的混合仿真:在HLA和功能模型接口上实现的使用波形松弛方法的混合分布式仿真框架
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260869
M. Awais, W. Gawlik, Gregor De-Cillia, P. Palensky
{"title":"Hybrid simulation using SAHISim framework: a hybrid distributed simulation framework using waveform relaxation method implemented over the HLA and the functional mock-up interface","authors":"M. Awais, W. Gawlik, Gregor De-Cillia, P. Palensky","doi":"10.4108/eai.24-8-2015.2260869","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260869","url":null,"abstract":"Hybrid systems such as Cyber Physical Systems (CPS) are becoming more important with time. Apart from CPS there are many hybrid systems in nature. To perform a simulation based analysis of a hybrid system, a simulation framework is presented, named SAHISim. It is based on the most popular simulation interoperability standards, i.e. High Level Architecture (HLA) and Functional Mock-up Interface (FMI). Being a distributed architecture it is able to execute on cluster, cloud and other distributed topologies. Moreover, as it is based on standards so it allows many different simulation packages to interoperate, making it a flexible and robust solution for simulation based analysis. The underlying algorithm which enables the synchronization of different simulation components is discussed in detail. A test example is presented, whose results are compared to a monolithic simulation of the same model for verification of results.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130416171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An analysis of increased vertical scaling in three-dimensional virtual world simulation 三维虚拟世界仿真中增加垂直缩放的分析
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260963
Sean C. Mondesire, Jonathan Stevens, Douglas B. Maxwell
{"title":"An analysis of increased vertical scaling in three-dimensional virtual world simulation","authors":"Sean C. Mondesire, Jonathan Stevens, Douglas B. Maxwell","doi":"10.4108/eai.24-8-2015.2260963","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260963","url":null,"abstract":"In this paper, we describe the analysis of the effect of vertical computational scaling on the performance of a simulation based training prototype currently under development by the U.S. Army Research Laboratory. The United States military is interested in facilitating Warfighter training by investigating large-scale realistic virtual operational environments. In order to support expanded training at higher echelons, virtual world simulators need to scale to support more simultaneous client connections, more intelligent agents, and more physics interactions. This work provides an in-depth analysis of a virtual world simulator under different hardware profiles to determine the effect of increased vertical computational scaling.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124304467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
ITFComp: a compression algorithm for ARM architecture instruction trace files ITFComp: ARM架构指令跟踪文件的压缩算法
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260596
Mohammad Qasem, Lukas Pustina
{"title":"ITFComp: a compression algorithm for ARM architecture instruction trace files","authors":"Mohammad Qasem, Lukas Pustina","doi":"10.4108/eai.24-8-2015.2260596","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260596","url":null,"abstract":"Testing the performance of a new computational component is costly due to the need of prototyping different setups. Therefore, trace driven hardware simulations are used. Instruction Trace Files (ITFs) are files containing traces of executed instructions in a program's run and are used as an input for hardware simulations. ITFs tend to be large in size, causing a storage challenge. Many trace reduction techniques exist to deal with the ITFs' storage challenge. In this paper we introduce ITFComp, a compression algorithm that combines general purpose compression methods with knowledge about ARM architecture ITFs' structure to reduce their size. ITFComp also works on compressing data memory addresses accessed by instructions within ITFs to further reduce an ITF size. Results show a reduction of 600 times on average when combined with LZMA compression algorithm. This reduction is 4 times better than when using LZMA alone, and 10 times better than when using DEFLATE. ITFComp introduces a negligible overhead in the decompression time (less than 1%).","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FREACSIM: a framework for creating and simulating real-time capable network on chip systems and applications FREACSIM:用于创建和模拟芯片系统和应用程序上的实时网络的框架
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260960
Dominik Schoenwetter, R. Veldema, D. Fey
{"title":"FREACSIM: a framework for creating and simulating real-time capable network on chip systems and applications","authors":"Dominik Schoenwetter, R. Veldema, D. Fey","doi":"10.4108/eai.24-8-2015.2260960","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260960","url":null,"abstract":"This paper presents the new Framework for Real-time capable Embedded system and ArChitecture SIMulation (FREACSIM), a highly configurable full-system simulation environment enabling and easing the modeling, simulation and verification of Network on Chip architectures for hard real-time systems. The framework is mostly geared towards software developers, supporting them in the simulation of NoCs at an instruction accurate level and offers a broad variety of real-world hardware components as part of the integrated virtualization toolbox. \u0000 \u0000FREACSIM provides a software-based routing strategy between nodes, with a single node consisting of a processor and required peripherals for enabling real-time capability. This allows a flexible and independent comparison of currently implemented hardware strategies, as well as an easy adaption to better suit new hardware needs. The software-based routing, as well as distributed applications that can be implemented for the NoC hardware design, are able to use the real-time operating system eCos, which is part of our framework. As a result, real-time capable software can be implemented for, and tested on, complex NoC systems. \u0000 \u0000We demonstrate the flexibility and the benefits of our framework with a set of applications (use cases), which cover typical heavy and light load distributions between communication and computation.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131904707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modelling and simulating systems security policy 建模和模拟系统安全策略
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2260765
T. Caulfield, D. Pym
{"title":"Modelling and simulating systems security policy","authors":"T. Caulfield, D. Pym","doi":"10.4108/eai.24-8-2015.2260765","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2260765","url":null,"abstract":"Security managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology---grounded in semantically justified mathematical systems modelling, the economics of decision-making, and simulation---can be used to explore the operational consequences of their design choices and help security managers to make better decisions. The methodology is based on constructing executable system models that illustrate the effects of different policy choices. Models are compositional, allowing complex systems to be expressed as combinations of smaller, complete models. They capture the logical and physical structure of systems, the choices and behaviour of agents within the system, and the security managers' preferences about outcomes. Utility theory is used to describe the extent to which security managers' policies deliver their security objectives. Models are parametrized based on data obtained from observations of real-world systems that correspond closely to the examples described.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
CASSANDRA: a simulation-based, decision-support tool for energy market stakeholders CASSANDRA:为能源市场利益相关者提供基于模拟的决策支持工具
International ICST Conference on Simulation Tools and Techniques Pub Date : 2015-08-24 DOI: 10.4108/eai.24-8-2015.2261086
Konstantinos N. Vavliakis, Anthony C. Chrysopoulos, Kyriakos C. Chatzidimitriou, A. Symeonidis, P. Mitkas
{"title":"CASSANDRA: a simulation-based, decision-support tool for energy market stakeholders","authors":"Konstantinos N. Vavliakis, Anthony C. Chrysopoulos, Kyriakos C. Chatzidimitriou, A. Symeonidis, P. Mitkas","doi":"10.4108/eai.24-8-2015.2261086","DOIUrl":"https://doi.org/10.4108/eai.24-8-2015.2261086","url":null,"abstract":"Energy gives personal comfort to people, and is essential for the generation of commercial and societal wealth. Nevertheless, energy production and consumption place considerable pressures on the environment, such as the emission of green-house gases and air pollutants. They contribute to climate change, damage natural ecosystems and the man-made environment, and cause adverse effects to human health. Lately, novel market schemes emerge, such as the formation and operation of customer coalitions aiming to improve their market power through the pursuit of common benefits. \u0000 \u0000In this paper we present CASSANDRA, an open source1, expandable software platform for modelling the demand side of power systems, focusing on small scale consumers. The structural elements of the platform are a) the electrical installations (i.e. households, commercial stores, small industries etc.), b) the respective appliances installed, and c) the electrical consumption-related activities of the people residing in the installations. \u0000 \u0000CASSANDRA serves as a tool for simulation of real demand-side environments providing decision support for energy market stakeholders. The ultimate goal of the CASSANDRA simulation functionality is the identification of good practices that lead to energy efficiency, clustering electric energy consumers according to their consumption patterns, and the studying consumer change behaviour when presented with various demand response programs.","PeriodicalId":132237,"journal":{"name":"International ICST Conference on Simulation Tools and Techniques","volume":"538 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114093376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信