2009 Fourth International Conference on Dependability of Computer Systems最新文献

筛选
英文 中文
A Consistency Model for Distributed Virtual Reality Systems 分布式虚拟现实系统的一致性模型
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.17
V. Y. Kharitonov
{"title":"A Consistency Model for Distributed Virtual Reality Systems","authors":"V. Y. Kharitonov","doi":"10.1109/DepCoS-RELCOMEX.2009.17","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.17","url":null,"abstract":"As a further development of works published in previous DepCoS-RELCOMEX conferences, this paper is devoted to one of the most important problems taking place in distributed virtual reality systems (DVR systems): maintenance of consistency among the processes within DVR system, which is required to ensure that all users have a sense of presence in a common shared virtual world. In this paper an event-based model of distributed computations in DVR systems is discussed. Then we consider different approaches to consistency definition, such as causal, observational and space-time consistency. In order to reach high space-time consistency in DVR system, large amounts of geographically distributed data should be replicated in real time. However, due to hardware limitations it is still impossible to achieve absolute consistency. Moreover, in most cases the absolute consistency is not necessary. In this work we propose a data consistency model based on selective consistency principle allowing to ensure consistency only on those parameters which are in most importance for specific task. Within the model the issues of data representation, storage and communication are discussed.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"384 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132259850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Applying Queuing Models for Assessing Network Services Dependability Parameters in Modern Information Systems 应用排队模型评估现代信息系统中网络服务可靠性参数
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.48
Lukasz Bagrij, K. Michalska, Marek Woda
{"title":"Applying Queuing Models for Assessing Network Services Dependability Parameters in Modern Information Systems","authors":"Lukasz Bagrij, K. Michalska, Marek Woda","doi":"10.1109/DepCoS-RELCOMEX.2009.48","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.48","url":null,"abstract":"Due to the continuous growth of Internet users, computer systems become more powerful to follow still rising needs. Modern structures so-called Information Systems encompass not only more reliable hardware, but first of all multifunctional and thus highly compound software. On one hand, this gives great opportunity to realize very complex tasks through a network, even such as commercial business services. On the other hand, this introduces many issues with dependability of such systems that management and control of these infrastructures becomes extremely hard. Adapting well-studied knowledge on systems dependability to the new circumstances, we emphasize role of performance as one of dependability properties. Our response for requirements of efficient means for optimization and forecasting of Information Systems is to revitalize queuing models concept and combine them with computer simulation techniques in order to obtain scalable, fast and detailed enough analysis methodology.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132173372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process 基于本体的通用标准兼容开发过程安全问题定义与解决方案
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.15
A. Bialas
{"title":"Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process","authors":"A. Bialas","doi":"10.1109/DepCoS-RELCOMEX.2009.15","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.15","url":null,"abstract":"The paper shows how to apply a new ontology-based approach to the security problem definition (SPD), which is the key stage of the IT security development process compliant with the ISO/IEC 15408 Common Criteria standard. The SPD specifies threats, security policies and assumptions concerning the developed target of evaluation (TOE). On the SPD basis the security objectives (SO) are elaborated expressing the SPD problem solution, being the basis for further implementation works. The paper presents shortly the Specification Means Ontology (SMO), the related knowledge base and their use by the IT security developers while the security problem is formulated and solved. The paper gives some examples concerning a simple firewall, summarizes the results and experiences, and defines the plans of future works.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125272881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Inconsistent State Analysis of a Network Receiver with Colored Petri Nets 彩色Petri网网络接收机不一致状态分析
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.42
M. Bouali, P. Barger, W. Schön
{"title":"Inconsistent State Analysis of a Network Receiver with Colored Petri Nets","authors":"M. Bouali, P. Barger, W. Schön","doi":"10.1109/DepCoS-RELCOMEX.2009.42","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.42","url":null,"abstract":"This paper deals with a new method to study dependability of distributed systems using Colored Petri Nets (CPN) which are a powerful, recognized and intuitive modelling tool. They allow a precise representation of the studied systems. The CPN analysis gives information about static and dynamic behavior of the modelled system and can be used to study questions concerning its dependability. This paper develops a new method of CPN analysis called the Backward reachability. It provides information about different ways of reaching a particular CPN marking that represent, for example, a failure state or a transilient fault. This analysis is performed on an inverse CPN which is obtained by transforming original CPN structure. The illustrative case is the study of a communication protocol composed of three parts: the sender, the receiver and the network. The Backward reachability analysis done on this system starts by supposing an inconsistent sate in the receiver and looks for the corresponding sender state. The main advantage of this method is that it determines the sequence leading from the initial to the final state independently on the final marking value.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125942207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Computations with Calculation Error Exclusion for Computation Geometry Algorithms 计算误差排除法在计算几何算法中的应用
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.43
Dmitry Orlov
{"title":"Application of Computations with Calculation Error Exclusion for Computation Geometry Algorithms","authors":"Dmitry Orlov","doi":"10.1109/DepCoS-RELCOMEX.2009.43","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.43","url":null,"abstract":"Calculation errors while using floating-point computation are considered as a source of computational geometry algorithms incorrect results. Methods of decreasing such errors influence on the algorithm are discussed. Computations with calculation error exclusion as a way of such errors elimination are proposed. Computations with calculation error exclusion defined as a kind of computation where results of certain arithmetic operations could be represented exactly (computations in rational numbers, for example). Algorithm of finding cases where floating-point computation causes incorrect results is proposed.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131468243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Use of Heuristics in Creating Speculation Strategy 启发法在创造投机策略中的应用
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.38
H. Piech, Urszula Górnik
{"title":"The Use of Heuristics in Creating Speculation Strategy","authors":"H. Piech, Urszula Górnik","doi":"10.1109/DepCoS-RELCOMEX.2009.38","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.38","url":null,"abstract":"In our paper we present the idea of creating heuristics, basing on the Nash equilibrium, for making decisions referring to stock games. On the contrary to preferring the stock parameters as well as the prognosis theory, applying the equilibrium of strategic games methods enriches the quantity of information (entropy level) which gives the possibility to consider the unfavourable and the unexpected trends and prognosis turns. This is an effect of considering varied strategies of game results, and also gives the possibility of creating 'monetary coalition', which protects player's financial resources.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116605728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model Based Framework for Specifying and Executing Fault Injection Experiments 一种基于模型的故障注入实验框架
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.41
János Oláh, I. Majzik
{"title":"A Model Based Framework for Specifying and Executing Fault Injection Experiments","authors":"János Oláh, I. Majzik","doi":"10.1109/DepCoS-RELCOMEX.2009.41","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.41","url":null,"abstract":"Dependability is a fundamental property of computer systems operating in critical environment. The measurement of dependability (and thus the assessment of the solutions applied to improve dependability) typically relies on controlled fault injection experiments that are able to reveal the behavior of the system in case of faults (to test error handling and fault tolerance) or extreme input conditions (to assess robustness of system components). In our paper we present an Eclipse-based fault injection framework that provides a model-based approach and a graphical user interface to specify both the fault injection experiments and the run-time monitoring of the results. It automatically implements the modifications that are required for fault injection and monitoring using the Javassist technology, this way it supports the dependability assessment and robustness testing of software components written in Java.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132196985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Model-Based Diagnostic Using Model Checking 使用模型检查的基于模型的诊断
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.33
M. Bourahla
{"title":"Model-Based Diagnostic Using Model Checking","authors":"M. Bourahla","doi":"10.1109/DepCoS-RELCOMEX.2009.33","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.33","url":null,"abstract":"In this paper, we present an approach integrating the two techniques of model-based diagnosis and model checking for diagnosing physical systems and debugging software programs (in particular hardware programs). For diagnosis, the physical system is modeled by a structural description viewing the connections between the different components of the system. Our approach which uses model checking technique, diagnoses this description (model) using the obtained observations from the real design (or simulation of a description program). This diagnosis is based on checking the consistency between these observations and the system description with a set of combinations of subsets of faulty and unfaulty components. For debugging, the program is first converted to a diagnosis model. Then, we use the model checking to check the satisfaction of the design properties, if at least one property is violated, our approach will generate a set of subsets of faulted components which are candidate for debugging this program by looking for the associated statements to these faulted components.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126874000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
UML-Based Reliability Modeling of Network Services, a UDP Echo Service Case Study 基于uml的网络服务可靠性建模,UDP回送服务案例研究
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.11
Z. Lipinski
{"title":"UML-Based Reliability Modeling of Network Services, a UDP Echo Service Case Study","authors":"Z. Lipinski","doi":"10.1109/DepCoS-RELCOMEX.2009.11","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.11","url":null,"abstract":"In the paper, we discuss state space reliability modeling formalism of distributed systems and services compliant with UML metamodel. Behavior of modeled application system we describe in terms of states. Service generation process we represent as a sequence of application system states. State space approach allows us to define dependence between application system components via dependence between components states and states input, output parameters. Reliability of application system component we define for each simply action state. Reliability of a service we express by components reliability in states determined by service generation process. As an example, we analyze reliability of client-server system which components exchange data by means of connectionless protocol. For several deployment configuration of the system, we calculate reliability of UDP Echo service.","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficiency Analysis in Communication Networks Topology Design 通信网络拓扑设计中的效率分析
2009 Fourth International Conference on Dependability of Computer Systems Pub Date : 2009-06-30 DOI: 10.1109/DepCoS-RELCOMEX.2009.50
E. Szlachcic, J. Mlynek
{"title":"Efficiency Analysis in Communication Networks Topology Design","authors":"E. Szlachcic, J. Mlynek","doi":"10.1109/DepCoS-RELCOMEX.2009.50","DOIUrl":"https://doi.org/10.1109/DepCoS-RELCOMEX.2009.50","url":null,"abstract":"Increasing attention is being recently devoted to various problems in the topological design of communication networks. In the paper we propose to solve a bi-criteria network topology design problem for considering a message delay and global cost as an objective functions vector under the connectivity constraint. An approach based on the bi-criteria genetic algorithm VEGA is developed for the network topology design problem. We present some experiments in order to certify the influence of genetic algorithm parameters for the quality of optimal design variable space and of an objective functions space. Finally a global network efficiency measure is proposed as an indicator for the designer to determine an efficient network communication topology from the Pareto-optimal set of solutions. Numerical results provide to illustrate that the proposed methodology can search effectively one communication network topology","PeriodicalId":185730,"journal":{"name":"2009 Fourth International Conference on Dependability of Computer Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114577818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信