{"title":"On Opportunity of Application of Modular Arithmetic for Accuracy Improvement in Positioning of Virtual Reality Moving Objects","authors":"Dmitry Orlov","doi":"10.1109/DepCoS-RELCOMEX.2008.22","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.22","url":null,"abstract":"Modular arithmetic as approach to accuracy improvement of virtual reality moving objects positioning is investigated. The technology of modular arithmetic application for such tasks solving and library of single-module system calculations were developed. Experiments for comparison between floating-point calculations and single-module system calculations were carried out.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114745438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dependability Analysis of SOA Systems","authors":"Michal Zyla, D. Caban","doi":"10.1109/DepCoS-RELCOMEX.2008.20","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.20","url":null,"abstract":"Service oriented architecture solutions are becoming increasingly popular in business processes. One of challenges this technology has to face is providing appropriate dependability levels and means for their calculation. There is a growing need for SOA solutions assessment before deployment. In this paper we try to develop a model of a business level service provider and define few metrics. The described model has been implanted into SSFNet simulator and some testing has been done. We present the results of our experiments.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Component-Based Systems","authors":"W. M. Zuberek, I. Bluemke","doi":"10.1109/DepCoS-RELCOMEX.2008.37","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.37","url":null,"abstract":"Dependability assessment of component-based systems must include verification of temporal and performance requirements as they can be of primary importance for many real-time and embedded systems. This paper uses labeled timed Petri nets as models of the behavior of components at their interfaces. These component models are systematically composed into an integrated model of the system which is used for verification of temporal characteristics and performance analysis.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116742298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constraint & Test Verification in Parallel Database Systems","authors":"Feras Hanandeh","doi":"10.1109/DepCoS-RELCOMEX.2008.42","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.42","url":null,"abstract":"Maintenance of integrity is an important issue in parallel database systems. Testing the validity of a large number of constraints against large databases and after each update operation is an expensive process. Many different methods for integrity constraint maintenance have been proposed by researchers. The main focus of the methods in the literature is the simplification process. The simplified forms of the integrity constraints (Cs) are called the integrity tests. The integrity constraints defined on the database must be semantically consistent and there is no contradiction among them. Adding a new constraint(s) may contradict with other existing integrity constraints in the database. This article concentrates on how to verify if a new integrity constraint contradicts with the existing constraint set defined on the parallel databases. Another interest of this article is the way of the system checks whether or not the constraints have been invalidated by a transaction and repair the integrity violations if there are violations.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127377736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly-Based Intrusion Detection Using Bayesian Networks","authors":"W. Tylman","doi":"10.1109/DepCoS-RELCOMEX.2008.52","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.52","url":null,"abstract":"This paper presents an application of Bayesian networks to the process of intrusion detection in computer networks. The presented system, called Basset (Bayesian system for intrusion detection) extends functionality of Snort, an open-source NIDS, by incorporating Bayesian networks as additional processing stages. The flexible nature of this solution allows it to be used both for misuse-based and anomaly-based detection process; this paper concentrates on the anomaly-based detection. The ultimate goal is to create a hybrid, misuse anomaly based solution that will allow interaction between these two techniques of intrusion detection. Ability to alter its behaviour based on historical data is also an important feature of the described system.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Roles of Actors in Social Networks Using the Properties of Actors' Neighborhood Structure","authors":"R. Brendel, H. Krawczyk","doi":"10.1109/DepCoS-RELCOMEX.2008.45","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.45","url":null,"abstract":"Members of the societies form many complex social relations that are often the subject of study in order to classify the members according to the roles they play in the considering society. Classification of roles played by the actors can be very informative because it gives us the complete overview of the network allowing for understanding how the network is organized and how it is going to behave in front of certain external or internal events. In the paper we present the roles identification method that can be useful in social environments about which we have limited knowledge mostly constrained to local relations in regard to the considered set of actors. The method uses the properties of social networks that can be derived from neighborhood of actors whose role we are going to determine. The method uses social relation graph, roles identification algorithm and a set of relations pattern graphs supporting the roles identification process. The method has been tested with local society of Internet e-mail users of one of the Faculty of Gdansk University of Technology to classify the role of each e-mail user as spammer or regular user.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124047686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspects in the Maintenance of Compiled Programs","authors":"I. Bluemke, K. Billewicz","doi":"10.1109/DepCoS-RELCOMEX.2008.15","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.15","url":null,"abstract":"Aspect oriented approach to the maintenance of programs with unavailable source code and documentation is proposed. Aspects are used to trace the program execution and identify points, in which aspects implementing new functionalities may be applied. A special tool for aspect oriented program tracing was designed and implemented. This tool is necessary to use the proposed approach. A modification of GIU interface of a compiled program without source code and documentation is presented. Advantages and disadvantages of described concepts are pointed out.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114747102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Antônio da Silva, José-Fernán Martínez, Alberto Gonzalez-Calero, Lourdes López-Santidrián, A. García, Vicente Hernández
{"title":"XML Schema Based Faultset Definition to Improve Faults Injection Tools Interoperability","authors":"Antônio da Silva, José-Fernán Martínez, Alberto Gonzalez-Calero, Lourdes López-Santidrián, A. García, Vicente Hernández","doi":"10.1504/IJCCBS.2010.031716","DOIUrl":"https://doi.org/10.1504/IJCCBS.2010.031716","url":null,"abstract":"This paper describes an XML schema formalization approach for the definition of basic fault sets which specify memory and/or register value corruption in microprocessor-based systems. SWIFI (software implemented fault injection) tools use fault injectors to carry out the fault injection campaign defined in a GUI-based application. However, the communication between the fault injector and the application is defined in an ad-hoc manner. Through this proposed XML schema definition different injectors could be used to carry out the same fault set injection. To validate this approach floating point register and memory corruptions with temporal triggers and routine interception mechanisms to carry out argument and return value, corruption has been considered. Moreover, an experimental tool called Exhaustifreg, consisting of a GUI Java application for defining the fault sets and injection policies and two injectors for SPARC and i386 architectures under RTEMS, has been developed. The XML-based approach improves the interoperability between SWIFI tools by uncoupling the injectors from the experiment manager in charge of the fault campaign.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133229439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Consistent Displaying of Virtual Reality Moving Objects","authors":"V. Y. Kharitonov","doi":"10.1109/DepCoS-RELCOMEX.2008.14","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.14","url":null,"abstract":"Distributed virtual reality systems are a new step in the development of interactive 3d-graphics applications, allowing geographically remote users to interact in a shared virtual environment, as if they situated in one room. The realism of userpsilas experience in such systems depends not only on the quality of graphics, but also on the underlying networking mechanisms. These mechanisms should provide consistent users interaction, eliminating the problems of a particular network. Especially, consistent displaying of virtual reality objects should be achieved. In this paper the main principles of distributed virtual reality systems design are explored. Special attention is drawn to the reliability issues of such systems in terms of consistent interaction. An approach to consistent displaying of virtual reality moving objects is proposed. It allows to reduce influence of hardware limitations and the overall network workload through a more flexible way of network traffic management taking into account the movement dynamics of the objects.","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116759506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ceccarelli, I. Majzik, D. Iovino, F. Caneschi, G. Pintér, A. Bondavalli
{"title":"A Resilient SIL 2 Driver Machine Interface for Train Control Systems","authors":"A. Ceccarelli, I. Majzik, D. Iovino, F. Caneschi, G. Pintér, A. Bondavalli","doi":"10.1109/DepCoS-RELCOMEX.2008.33","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2008.33","url":null,"abstract":"In railway train-borne equipment, the driver machine interface (DMI) acts like a bridge between the train driver and the onboard automatic train control system (European Vital Computer, EVC). While the DMI is required to operate in a critical context, current DMIs have no safety requirements. This implies that the EVC may automatically stop the train whenever the DMI is suspected to misbehave, leading to delay of the train, inconvenience for passengers and consequent possible profit loss. For these reasons a DMI with higher safety requirements is worth to be taken into account, even if it implies higher costs. The SAFEDMI European project aims at developing (i) a DMI at Safety Integrity Level 2 (SIL 2) using off-the-shelf components and a simple hardware architecture to reduce costs, and (ii) a SIL 2 wireless communication support for maintenance. This paper describes the architecture of a DMI which satisfies these objectives. The main hardware and software characteristics will be shown, including the proposed error detection techniques and the related fault handling (characterized by a new operational mode that allows DMI to restart silently, thus reducing unexpected train stops).","PeriodicalId":167937,"journal":{"name":"2008 Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}