2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX最新文献

筛选
英文 中文
On Opportunity of Application of Modular Arithmetic for Accuracy Improvement in Positioning of Virtual Reality Moving Objects 模算法在提高虚拟现实运动物体定位精度中的应用机遇
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.22
Dmitry Orlov
{"title":"On Opportunity of Application of Modular Arithmetic for Accuracy Improvement in Positioning of Virtual Reality Moving Objects","authors":"Dmitry Orlov","doi":"10.1109/DepCoS-RELCOMEX.2008.22","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.22","url":null,"abstract":"Modular arithmetic as approach to accuracy improvement of virtual reality moving objects positioning is investigated. The technology of modular arithmetic application for such tasks solving and library of single-module system calculations were developed. Experiments for comparison between floating-point calculations and single-module system calculations were carried out.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114745438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dependability Analysis of SOA Systems SOA系统的可靠性分析
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.20
Michal Zyla, D. Caban
{"title":"Dependability Analysis of SOA Systems","authors":"Michal Zyla, D. Caban","doi":"10.1109/DepCoS-RELCOMEX.2008.20","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.20","url":null,"abstract":"Service oriented architecture solutions are becoming increasingly popular in business processes. One of challenges this technology has to face is providing appropriate dependability levels and means for their calculation. There is a growing need for SOA solutions assessment before deployment. In this paper we try to develop a model of a business level service provider and define few metrics. The described model has been implanted into SSFNet simulator and some testing has been done. We present the results of our experiments.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance Analysis of Component-Based Systems 基于组件的系统性能分析
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.37
W. M. Zuberek, I. Bluemke
{"title":"Performance Analysis of Component-Based Systems","authors":"W. M. Zuberek, I. Bluemke","doi":"10.1109/DepCoS-RELCOMEX.2008.37","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.37","url":null,"abstract":"Dependability assessment of component-based systems must include verification of temporal and performance requirements as they can be of primary importance for many real-time and embedded systems. This paper uses labeled timed Petri nets as models of the behavior of components at their interfaces. These component models are systematically composed into an integrated model of the system which is used for verification of temporal characteristics and performance analysis.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116742298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constraint & Test Verification in Parallel Database Systems 并行数据库系统中的约束与测试验证
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.42
Feras Hanandeh
{"title":"Constraint & Test Verification in Parallel Database Systems","authors":"Feras Hanandeh","doi":"10.1109/DepCoS-RELCOMEX.2008.42","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.42","url":null,"abstract":"Maintenance of integrity is an important issue in parallel database systems. Testing the validity of a large number of constraints against large databases and after each update operation is an expensive process. Many different methods for integrity constraint maintenance have been proposed by researchers. The main focus of the methods in the literature is the simplification process. The simplified forms of the integrity constraints (Cs) are called the integrity tests. The integrity constraints defined on the database must be semantically consistent and there is no contradiction among them. Adding a new constraint(s) may contradict with other existing integrity constraints in the database. This article concentrates on how to verify if a new integrity constraint contradicts with the existing constraint set defined on the parallel databases. Another interest of this article is the way of the system checks whether or not the constraints have been invalidated by a transaction and repair the integrity violations if there are violations.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127377736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly-Based Intrusion Detection Using Bayesian Networks 基于贝叶斯网络的异常入侵检测
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.52
W. Tylman
{"title":"Anomaly-Based Intrusion Detection Using Bayesian Networks","authors":"W. Tylman","doi":"10.1109/DepCoS-RELCOMEX.2008.52","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.52","url":null,"abstract":"This paper presents an application of Bayesian networks to the process of intrusion detection in computer networks. The presented system, called Basset (Bayesian system for intrusion detection) extends functionality of Snort, an open-source NIDS, by incorporating Bayesian networks as additional processing stages. The flexible nature of this solution allows it to be used both for misuse-based and anomaly-based detection process; this paper concentrates on the anomaly-based detection. The ultimate goal is to create a hybrid, misuse anomaly based solution that will allow interaction between these two techniques of intrusion detection. Ability to alter its behaviour based on historical data is also an important feature of the described system.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Detection of Roles of Actors in Social Networks Using the Properties of Actors' Neighborhood Structure 基于行动者邻域结构特性的社会网络行动者角色检测
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.45
R. Brendel, H. Krawczyk
{"title":"Detection of Roles of Actors in Social Networks Using the Properties of Actors' Neighborhood Structure","authors":"R. Brendel, H. Krawczyk","doi":"10.1109/DepCoS-RELCOMEX.2008.45","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.45","url":null,"abstract":"Members of the societies form many complex social relations that are often the subject of study in order to classify the members according to the roles they play in the considering society. Classification of roles played by the actors can be very informative because it gives us the complete overview of the network allowing for understanding how the network is organized and how it is going to behave in front of certain external or internal events. In the paper we present the roles identification method that can be useful in social environments about which we have limited knowledge mostly constrained to local relations in regard to the considered set of actors. The method uses the properties of social networks that can be derived from neighborhood of actors whose role we are going to determine. The method uses social relation graph, roles identification algorithm and a set of relations pattern graphs supporting the roles identification process. The method has been tested with local society of Internet e-mail users of one of the Faculty of Gdansk University of Technology to classify the role of each e-mail user as spammer or regular user.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124047686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Aspects in the Maintenance of Compiled Programs 编译程序维护的几个方面
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.15
I. Bluemke, K. Billewicz
{"title":"Aspects in the Maintenance of Compiled Programs","authors":"I. Bluemke, K. Billewicz","doi":"10.1109/DepCoS-RELCOMEX.2008.15","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.15","url":null,"abstract":"Aspect oriented approach to the maintenance of programs with unavailable source code and documentation is proposed. Aspects are used to trace the program execution and identify points, in which aspects implementing new functionalities may be applied. A special tool for aspect oriented program tracing was designed and implemented. This tool is necessary to use the proposed approach. A modification of GIU interface of a compiled program without source code and documentation is presented. Advantages and disadvantages of described concepts are pointed out.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
XML Schema Based Faultset Definition to Improve Faults Injection Tools Interoperability 基于XML模式的故障集定义提高故障注入工具的互操作性
Antônio da Silva, José-Fernán Martínez, Alberto Gonzalez-Calero, Lourdes López-Santidrián, A. García, Vicente Hernández
{"title":"XML Schema Based Faultset Definition to Improve Faults Injection Tools Interoperability","authors":"Antônio da Silva, José-Fernán Martínez, Alberto Gonzalez-Calero, Lourdes López-Santidrián, A. García, Vicente Hernández","doi":"10.1504/IJCCBS.2010.031716","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031716","url":null,"abstract":"This paper describes an XML schema formalization approach for the definition of basic fault sets which specify memory and/or register value corruption in microprocessor-based systems. SWIFI (software implemented fault injection) tools use fault injectors to carry out the fault injection campaign defined in a GUI-based application. However, the communication between the fault injector and the application is defined in an ad-hoc manner. Through this proposed XML schema definition different injectors could be used to carry out the same fault set injection. To validate this approach floating point register and memory corruptions with temporal triggers and routine interception mechanisms to carry out argument and return value, corruption has been considered. Moreover, an experimental tool called Exhaustifreg, consisting of a GUI Java application for defining the fault sets and injection policies and two injectors for SPARC and i386 architectures under RTEMS, has been developed. The XML-based approach improves the interoperability between SWIFI tools by uncoupling the injectors from the experiment manager in charge of the fault campaign.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133229439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An Approach to Consistent Displaying of Virtual Reality Moving Objects 一种虚拟现实运动物体的一致显示方法
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.14
V. Y. Kharitonov
{"title":"An Approach to Consistent Displaying of Virtual Reality Moving Objects","authors":"V. Y. Kharitonov","doi":"10.1109/DepCoS-RELCOMEX.2008.14","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.14","url":null,"abstract":"Distributed virtual reality systems are a new step in the development of interactive 3d-graphics applications, allowing geographically remote users to interact in a shared virtual environment, as if they situated in one room. The realism of userpsilas experience in such systems depends not only on the quality of graphics, but also on the underlying networking mechanisms. These mechanisms should provide consistent users interaction, eliminating the problems of a particular network. Especially, consistent displaying of virtual reality objects should be achieved. In this paper the main principles of distributed virtual reality systems design are explored. Special attention is drawn to the reliability issues of such systems in terms of consistent interaction. An approach to consistent displaying of virtual reality moving objects is proposed. It allows to reduce influence of hardware limitations and the overall network workload through a more flexible way of network traffic management taking into account the movement dynamics of the objects.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Resilient SIL 2 Driver Machine Interface for Train Control Systems 列车控制系统的弹性SIL 2驱动机接口
2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX Pub Date : 2008-06-26 DOI: 10.1109/DepCoS-RELCOMEX.2008.33
A. Ceccarelli, I. Majzik, D. Iovino, F. Caneschi, G. Pintér, A. Bondavalli
{"title":"A Resilient SIL 2 Driver Machine Interface for Train Control Systems","authors":"A. Ceccarelli, I. Majzik, D. Iovino, F. Caneschi, G. Pintér, A. Bondavalli","doi":"10.1109/DepCoS-RELCOMEX.2008.33","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.33","url":null,"abstract":"In railway train-borne equipment, the driver machine interface (DMI) acts like a bridge between the train driver and the onboard automatic train control system (European Vital Computer, EVC). While the DMI is required to operate in a critical context, current DMIs have no safety requirements. This implies that the EVC may automatically stop the train whenever the DMI is suspected to misbehave, leading to delay of the train, inconvenience for passengers and consequent possible profit loss. For these reasons a DMI with higher safety requirements is worth to be taken into account, even if it implies higher costs. The SAFEDMI European project aims at developing (i) a DMI at Safety Integrity Level 2 (SIL 2) using off-the-shelf components and a simple hardware architecture to reduce costs, and (ii) a SIL 2 wireless communication support for maintenance. This paper describes the architecture of a DMI which satisfies these objectives. The main hardware and software characteristics will be shown, including the proposed error detection techniques and the related fault handling (characterized by a new operational mode that allows DMI to restart silently, thus reducing unexpected train stops).","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信