- Full text PDF available (6)
Existing position-based routing algorithms, where packets are forwarded in the geographic direction of the destination, normally require that the forwarding node knows the positions of all neighbors in its transmission range. This information on direct neighbors is gained by observing beacon messages that each node sends out periodically. Several beaconless… (More)
Software evolution and reuse is more likely to receive higher payoff if high-level artifacts—such as architectures and designs—can be reused and can guide low-level component reuse. In practice, however , high-level artifacts are often not appropriately captured. This paper presents an approach to capturing and assessing software architectures for evolution… (More)
Ad hoc, actuator and sensor wireless networks normally have critical connectivity properties before becoming fault intolerant. Existing algorithms for testing k-connectivity are centralized. In this article, we introduce localized algorithms for testing A-connectivity. In localized protocols, each node makes its own decision based on the information… (More)
1 Abstract Software architectures are often claimed to be robust. However, there is no explicit and concrete definition of software architecture robustness. This paper gives a definition of software architecture robustness and presents a set of architecture metrics that were applied to real-time telecommunications software for the evaluation of robustness.… (More)
Depth First Search (DFS) and position based routing algorithms were proposed in literature. These are localized algorithms that guarantee the delivery for connected ad hoc and sensor wireless networks modeled by arbitrary graphs, including inaccurate location information for a destination node. This paper first optimizes an existing DFS based routing scheme… (More)
Depth First Search (DFS) and position-based routing algorithms were proposed in literature. These are localised algorithms that guarantee the delivery for connected ad hoc and sensor wireless networks modelled by arbitrary graphs, including inaccurate location information for a destination node. This article first optimises an existing DFS-based routing… (More)
to SA/RT by means of High-Level timed Petri Nets " , The international journal of time critical computing systems,  Department of Defense (DoD): Procedures of performing a failure mode, effects and criticality analysis. DoD, MIL_-STD_1629A.