IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)最新文献

筛选
英文 中文
Smart checklists for human-intensive medical systems 人力密集型医疗系统的智能检查清单
G. Avrunin, L. Clarke, L. Osterweil, J. Goldman, T. Rausch
{"title":"Smart checklists for human-intensive medical systems","authors":"G. Avrunin, L. Clarke, L. Osterweil, J. Goldman, T. Rausch","doi":"10.1109/DSNW.2012.6264661","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264661","url":null,"abstract":"Human-intensive cyber-physical systems involve software applications and hardware devices, but also depend upon the expertise of human participants to achieve their goal. In this paper. we describe a project we have started to improve the effectiveness of such systems by providing Smart Checklists to support and guide human participants in carrying out their tasks, including their interactions with the devices and software applications.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117250635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Invited talk: Virtual coaches in health care 特邀演讲:医疗保健中的虚拟教练
D. Siewiorek
{"title":"Invited talk: Virtual coaches in health care","authors":"D. Siewiorek","doi":"10.1109/DSNW.2012.6264659","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264659","url":null,"abstract":"Summary form only given. With health care costs raising astronomically and the number of aging increasing, there are not enough economic or human resources in the way of care givers to meet society's needs. A confluence of technologies including miniature electronics, digital communications, human-computer interaction, robotics, and machine learning makes possible the creation of intelligent assistants that monitor and communicate with users, understand their needs and goals, and compensate for diminished capabilities as we age or suffer a disability. This talk will highlight some of the results from the Quality of Life Technology Center (a NSF Engineering Research Center) in creating virtual coaches that monitor user activities providing reminders and advice to reach personal and caregiver goals.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Dependability as a cloud service - a modular approach 作为云服务的可靠性——一种模块化方法
Jan S. Rellermeyer, S. Bagchi
{"title":"Dependability as a cloud service - a modular approach","authors":"Jan S. Rellermeyer, S. Bagchi","doi":"10.1109/DSNW.2012.6264688","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264688","url":null,"abstract":"Failures of services on cloud platforms are only to be expected. To deal with such failures, one is naturally inclined to use the traditional measure of replication. However, replication of services on distributed cloud platforms poses several challenges that are not well met by today's Java middleware systems. These challenges are the need to isolate state in the application components so that easy migration and recovery are possible and the requirement for client transparency when dealing with different replicated service instances. For example, Java Enterprise Edition (JEE) makes it difficult to have transparent replication of services due to the above two reasons plus the fine-grained nature of interactions between its components (the Enterprise Java Beans). In this paper, we show parts of the design of OSGi, a specification defining a dynamic component system in Java, that make it suitable for the above task. We then propose two extensions to OSGi which will allow exposing and exporting application component state and transparent invocation of service instances. These two together can enable easy replication and recovery from failures in cloud environments. We show through experiments that our prototype can migrate a failed service quickly enough to a new machine so that a client experiences only a moderate increase in service invocation time during system recovery.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards incorporating human intelligence into online security solutions 将人类智能融入在线安全解决方案
S. Zonouz, R. Berthier, Negin Arhami
{"title":"Towards incorporating human intelligence into online security solutions","authors":"S. Zonouz, R. Berthier, Negin Arhami","doi":"10.1109/DSNW.2012.6264684","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264684","url":null,"abstract":"The design of automated online security and intrusion tolerance solutions for computer systems and networks is a theoretically achievable objective. However, after two decades of research, this objective has still not yet successfully passed the practicality test to become widely adopted. We believe that the main reason behind this gap lies in the misleading definition of autonomous security that precludes human intervention in trying to achieve unrealistic level of full automation. In this position paper, we discuss a novel research direction to address this challenge through a coherent integration of human intelligence. In particular, we identify the key questions to be answered in order to enable human intelligence to be leveraged in a seamless manner and without requiring explicit heavy human involvements. We illustrate our discussion through the preliminary design of a semi-automated intrusion detection and response system that incorporates reasonable human input to achieve higher levels of intrusion tolerance efficiency.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125984723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Invited talk: A model and simulation for user-centric automation devices and systems 特邀演讲:以用户为中心的自动化设备和系统的模型和仿真
J. W. Liu
{"title":"Invited talk: A model and simulation for user-centric automation devices and systems","authors":"J. W. Liu","doi":"10.1109/DSNW.2012.6264660","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264660","url":null,"abstract":"Summary form only given. This talk will present an environment and an executable model that support simulation of user-centric automation devices and systems (UCADS), human users and user-device interactions. The underlying UCADS combines workflow and GOMS model elements. The combination makes it possible to leverage GOMS interface evaluation techniques in experimentation with deviceuser interactions and assessment of actions and behavior of different human user(s) under different operating conditions, while applying workflow technologies to specify device operations and user-device interactions formally in a coherent, easy-to-understand way. The model and UCADS simulation environment enable experimentation with and the evaluation of device prototypes and their interactions with diverse, multiple users, for the purpose of identifying design and implementation flaws in a new device (or system) and assessing the degree to which the device is usable and safe.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123446465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures 航空电子领域与mls相关的信息流控制:安全增强软件体系结构的观点
Kevin Mueller, M. Paulitsch, S. Tverdyshev, Holger Blasum
{"title":"MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures","authors":"Kevin Mueller, M. Paulitsch, S. Tverdyshev, Holger Blasum","doi":"10.1109/DSNW.2012.6264665","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264665","url":null,"abstract":"Electronic architectures in the aerospace domain get more and more integrated and interconnected due to functional and architectural reasons. Such a tight integration raises the need to control information flows between different security domains on-board and off-board aircraft. This paper presents and discusses the specification and implementation of a software architecture of a security gateway integrated into avionics architectures. The paper shows that such a software architecture can be based on the current architectural principles and implementations in the avionics domain. We show that the embedded operating system PikeOS is a possible foundation for such a gateway architecture.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126890143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
On limitations of using cloud storage for data replication 关于使用云存储进行数据复制的限制
C. Cachin, Birgit Junker, A. Sorniotti
{"title":"On limitations of using cloud storage for data replication","authors":"C. Cachin, Birgit Junker, A. Sorniotti","doi":"10.1109/DSNW.2012.6264683","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264683","url":null,"abstract":"Cloud storage services often provide a key-value store (KVS) functionality, an object-based interface for accessing a collection of unstructured data items or blobs. Every blob is associated with a key that serves as identifier to access the blob. In the simplest form, a key-value store provides only methods for writing and reading an entire blob, for removing blobs, and for listing all defined keys. On the other hand, many existing schemes for replicating data with the goal of enhancing resilience (e.g., based on quorum systems) associate logical timestamps with the stored values, in order to distinguish multiple versions of the same data item. This paper uses the consensus number of a shared storage abstraction as a measure for its power to facilitate the implementation of data replication. It is demonstrated that a KVS is a very simple primitive, not different from read/write registers in this sense, and that a replica capable of the typical operations on timestamped data is fundamentally more powerful than a KVS. Hence, data replication schemes over storage providers with a KVS interface are inherently more difficult to realize than replication schemes over providers with richer interfaces.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126918112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
TRONE: Trustworthy and Resilient Operations in a Network Environment TRONE:网络环境下的可信和弹性操作
A. Casimiro, P. Veríssimo, D. Kreutz, Filipe Araújo, R. Barbosa, Samuel Neves, B. Sousa, M. Curado, Carlos Silva, R. Gandhi, P. Narasimhan
{"title":"TRONE: Trustworthy and Resilient Operations in a Network Environment","authors":"A. Casimiro, P. Veríssimo, D. Kreutz, Filipe Araújo, R. Barbosa, Samuel Neves, B. Sousa, M. Curado, Carlos Silva, R. Gandhi, P. Narasimhan","doi":"10.1109/DSNW.2012.6264694","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264694","url":null,"abstract":"Cloud infrastructures play an increasingly important role for telecom operators, because they enable internal consolidation of resources with the corresponding savings in hardware and management costs. However, this same consolidation exposes core services of the infrastructure to very disruptive attacks. This is indeed the case with monitoring, which needs to be dependable and secure to ensure proper operation of large datacenters and cloud infrastructures. We argue that currently existing centralized monitoring approaches (e.g., relying on a single solution provider, using single point of failure components) represent a huge risk, because a single vulnerability may compromise the entire monitoring infrastructure. In this paper, we describe the TRONE approach to trustworthy monitoring, which relies on multiple components to achieve increased levels of reliance on the monitoring data and hence increased trustworthiness. In particular, we focus on the TRONE framework for event dissemination, on security-oriented diagnosis based on collected events and on fast network adaptation in critical situations based on multi-homing application support. To validate our work, we will deploy and demonstrate our solutions in a live environment provided by Portugal Telecom.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132191237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A study of fault-tolerance characteristics of data center networks 数据中心网络容错特性研究
Yang Liu, Dong Lin, J. Muppala, M. Hamdi
{"title":"A study of fault-tolerance characteristics of data center networks","authors":"Yang Liu, Dong Lin, J. Muppala, M. Hamdi","doi":"10.1109/DSNW.2012.6264696","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264696","url":null,"abstract":"We present an evaluation of the fault-tolerance characteristics of several important data center network topologies, including Fat-tree, DCell, HyperBCube and BCube using several metrics, including average path length, aggregated bottleneck throughput and connection failure ratio. These enable us to present an objective comparison of the network topologies under faulty conditions.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114663901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A scalable double in-memory checkpoint and restart scheme towards exascale 面向百亿亿级的可扩展双内存检查点和重启方案
G. Zheng, Xiang Ni, L. Kalé
{"title":"A scalable double in-memory checkpoint and restart scheme towards exascale","authors":"G. Zheng, Xiang Ni, L. Kalé","doi":"10.1109/DSNW.2012.6264677","DOIUrl":"https://doi.org/10.1109/DSNW.2012.6264677","url":null,"abstract":"As the size of supercomputers increases, the probability of system failure grows substantially, posing an increasingly significant challenge for scalability. It is important to provide resilience for long running applications. Checkpoint-based fault tolerance methods are effective approaches at dealing with faults. With these methods, the state of the entire parallel application is checkpointed to reliable storage. When a failure occurs, the application is restarted from a recent checkpoint. In previous work, we have demonstrated an efficient double in-memory checkpoint and restart fault tolerance scheme, which leverages Charm++'s parallel objects for checkpointing. In this paper, we further optimize the scheme by eliminating several bottlenecks caused by serialized communication. We extend the in-memory checkpointing scheme to work on MPI communication layer, and demonstrate the performance on very large scale supercomputers. For example, when running a one million atom molecular dynamics simulation on up to 64K cores of a BlueGene/P machine, the checkpoint time was in milliseconds. The restart time was measured to be less than 0.15 seconds on 64K cores.","PeriodicalId":159358,"journal":{"name":"IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信