TECHNICAL UNIVERSITY OF MUNICH

Displaying 1-8 of 8 results

  • White Papers // Feb 2011

    OptimalSQM: Optimal Software Quality Management Framework Architecture

    A Software companies are often challenged with providing QA and testing of their software in an effective and efficient manner. What a QA staff and project management must do to make software quality more certain? They must have adequate software project management and test management infrastructure such is Optimal Software...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jan 2011

    System Identification With General Dynamic Neural Networks and Network Pruning

    This paper presents an exact pruning algorithm with adaptive pruning interval for General Dynamic Neural Networks (GDNN). GDNNs are artificial neural networks with internal dynamics. All layers have feedback connections with time delays to the same and to all other layers. The structure of the plant is unknown, so the...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jul 2010

    Using the HiiMap Mapping System as a Public Key Infrastructure

    The HiiMap architecture is a Next Generation Network concept which is based around the locator/identifier split idea. As with each NGN architecture, security was a major concern from the beginning and one of the design goals was, to integrate the functionality to establish secure connections into the architecture. The 2-tier...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jun 2010

    One Software Tool for Testing Square S-Boxes

    An encryption technique is widely used to keep data confidential. Most of the block symmetric algorithms use substitution functions. Often this functions use so called S-BOX matrix. In this paper author presents one software tool for testing and measuring square s-boxes. Based on information theory functions for testing static and...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jun 2010

    Asynchronous Network Coded Multicast

    The authors consider the problem of setting up a multicast connection of minimum cost using network coding. It is well known that this can be posed in the form of a convex program. The contribution is an asynchronous algorithm for solving the optimization problem, in analogy to the well-known distributed...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Oct 2009

    Modeling and Verification for Timing Satisfaction of Fault-Tolerant Systems With Finiteness

    The complexity of distributed real-time systems is growing rapidly; model-based development tools are used to accelerate the development process and increase the quality of the produced code. In addition, it is possible to integrate formal verification as analysis technique into these tools. Currently, the standard verification process is achieved by...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // May 2009

    FTOS-Verify: Analysis and Verification of Non-Functional Properties for Fault-Tolerant Systems

    The focus of the tool FTOS is to alleviate designers' burden by offering code generation for non-functional aspects including fault-tolerance mechanisms. One crucial aspect in this context is to ensure that user-selected mechanisms for the system model are sufficient to resist faults as specified in the underlying fault hypothesis. In...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Dec 2008

    A Metering Infrastructure for Heterogenous Mobile Networks

    The next generation of mobile access networks will support different access technologies like UMTS, WLAN, WiMax and LTE. Optimal handover decisions between different access networks have to take various types of information into account, such as the load of possible target cells. However, collecting this information and transporting it to...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jun 2010

    Asynchronous Network Coded Multicast

    The authors consider the problem of setting up a multicast connection of minimum cost using network coding. It is well known that this can be posed in the form of a convex program. The contribution is an asynchronous algorithm for solving the optimization problem, in analogy to the well-known distributed...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // May 2009

    FTOS-Verify: Analysis and Verification of Non-Functional Properties for Fault-Tolerant Systems

    The focus of the tool FTOS is to alleviate designers' burden by offering code generation for non-functional aspects including fault-tolerance mechanisms. One crucial aspect in this context is to ensure that user-selected mechanisms for the system model are sufficient to resist faults as specified in the underlying fault hypothesis. In...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Oct 2009

    Modeling and Verification for Timing Satisfaction of Fault-Tolerant Systems With Finiteness

    The complexity of distributed real-time systems is growing rapidly; model-based development tools are used to accelerate the development process and increase the quality of the produced code. In addition, it is possible to integrate formal verification as analysis technique into these tools. Currently, the standard verification process is achieved by...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Dec 2008

    A Metering Infrastructure for Heterogenous Mobile Networks

    The next generation of mobile access networks will support different access technologies like UMTS, WLAN, WiMax and LTE. Optimal handover decisions between different access networks have to take various types of information into account, such as the load of possible target cells. However, collecting this information and transporting it to...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jun 2010

    One Software Tool for Testing Square S-Boxes

    An encryption technique is widely used to keep data confidential. Most of the block symmetric algorithms use substitution functions. Often this functions use so called S-BOX matrix. In this paper author presents one software tool for testing and measuring square s-boxes. Based on information theory functions for testing static and...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jul 2010

    Using the HiiMap Mapping System as a Public Key Infrastructure

    The HiiMap architecture is a Next Generation Network concept which is based around the locator/identifier split idea. As with each NGN architecture, security was a major concern from the beginning and one of the design goals was, to integrate the functionality to establish secure connections into the architecture. The 2-tier...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Jan 2011

    System Identification With General Dynamic Neural Networks and Network Pruning

    This paper presents an exact pruning algorithm with adaptive pruning interval for General Dynamic Neural Networks (GDNN). GDNNs are artificial neural networks with internal dynamics. All layers have feedback connections with time delays to the same and to all other layers. The structure of the plant is unknown, so the...

    Provided By TECHNICAL UNIVERSITY OF MUNICH

  • White Papers // Feb 2011

    OptimalSQM: Optimal Software Quality Management Framework Architecture

    A Software companies are often challenged with providing QA and testing of their software in an effective and efficient manner. What a QA staff and project management must do to make software quality more certain? They must have adequate software project management and test management infrastructure such is Optimal Software...

    Provided By TECHNICAL UNIVERSITY OF MUNICH