Proceedings 5th International Symposium on Autonomous Decentralized Systems最新文献

筛选
英文 中文
A high assurance on-line recovery technology for a space on-board computer 一种空间星载计算机高保证在线恢复技术
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917394
H. Yashiro, T. Fujiwara, K. Mori
{"title":"A high assurance on-line recovery technology for a space on-board computer","authors":"H. Yashiro, T. Fujiwara, K. Mori","doi":"10.1109/ISADS.2001.917394","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917394","url":null,"abstract":"A high-assurance online recovery technology for a space on-board computer that can be realized using commercial devices is proposed whereby a faulty processor node confirms its normality and then recovers without affecting the other processor nodes in operation. Also, the result of an evaluation test using the breadboard model (BBM) implementing this technology is reported. Because this technology enables simple and assured recovery of a faulty processor node regardless of its degree of redundancy, it can be applied to various applications, such as a launch vehicle, a satellite or a reusable space vehicle. As a result, decreasing the cost of an on-board computer is possible while maintaining its high reliability.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Autonomous information provision to achieve reliability for users and providers 自主提供信息,实现用户和提供者的可靠性
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917396
H. F. Ahmad, G. Sun, K. Mori
{"title":"Autonomous information provision to achieve reliability for users and providers","authors":"H. F. Ahmad, G. Sun, K. Mori","doi":"10.1109/ISADS.2001.917396","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917396","url":null,"abstract":"The rapid growth of information technology and the Internet have given rise to an increasing demand for information services. A large number of service providers offer information services to diversified users on the Internet. Users' requirements are heterogeneous and change very quickly. Popular servers are overloaded and cannot dynamically adapt to meet users' heterogeneous requirements. It is necessary to design an information service system that can meet users' heterogeneous requirements for services, and to design in the adaptability of services to cope with ever-changing situations, to provide assurance. A faded information field architecture and push/pull mobile agent technologies have been proposed as basic components of an autonomous information service system to achieve these goals. The system has been proposed from the users' and providers' points of view, and therefore techniques for balancing users' and providers' costs are required for the realization of the system. The system leads to dynamic and autonomous information allocation, in which each node on the network may determine the amount of information based on the push/pull cost of the mobile agents. In this paper, we propose the initial construction of the faded information field based on providers' and users' heterogeneous reliability requirements. The through rate is used to reconstruct the faded information field dynamically and autonomously. We prove the effectiveness of the proposed technology through simulation.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116649092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Formal analysis of software security system architectures 软件安全系统架构的形式化分析
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917448
Yi Deng, Jiacun Wang, J. Tsai
{"title":"Formal analysis of software security system architectures","authors":"Yi Deng, Jiacun Wang, J. Tsai","doi":"10.1109/ISADS.2001.917448","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917448","url":null,"abstract":"We present an approach for analysis of security system architecture. Constraint patterns are introduced to formally specify the generic form of security policies that all implementations of the system architecture must enforce. The analysis is driven by incrementally decomposing a system-wide constraint pattern into a set of constraint patterns of constituent components. Since there are potentially many ways to partition a security system, a key element of the analysis is to verify that the component constraint patterns are collectively consistent with the global constraint pattern under the given architecture. A \"consistent\" component constraint is then used as the basis for analyzing possible designs of the component. We show that our approach is both flexible and scalable, which not only ensures the consistency of critical early design decisions, but also provides a framework to guide correct implementations of the design.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116669653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reconfigurable context-sensitive middleware for ADS applications in mobile ad hoc network environments 移动自组织网络环境中用于ADS应用的可重构上下文敏感中间件
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917435
S. Yau, F. Karim
{"title":"Reconfigurable context-sensitive middleware for ADS applications in mobile ad hoc network environments","authors":"S. Yau, F. Karim","doi":"10.1109/ISADS.2001.917435","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917435","url":null,"abstract":"The emergence of inexpensive and low-power wireless communication hardware and various handheld, wearable, and embedded computing technologies is making computing and communication devices more mobile and ubiquitous. Due to the mobility and high-density of network-enabled devices, short range mobile ad hoc networks (MANET) are instantaneously and autonomously formed to facilitate exchange of information. In MANET, interactions among the devices are driven by constantly changing contextual and environmental conditions, rather than by the applications resident on the devices. This trend makes autonomous decentralized systems (ADS) a desirable architecture for facilitating ad hoc communication among mobile devices. In this paper, reconfigurable context-sensitive middleware (RCSM) is presented to facilitate ADS applications in MANET.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130545984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A stabilizing search tree with availability properties 具有可用性属性的稳定搜索树
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917445
T. Herman, T. Masuzawa
{"title":"A stabilizing search tree with availability properties","authors":"T. Herman, T. Masuzawa","doi":"10.1109/ISADS.2001.917445","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917445","url":null,"abstract":"The ability of a system to recover from unexpected change in its environment or disruptions to its internal state is an indication of robust design and autonomous control. Recovery can be constrained by service availability requirements, so that even during periods of recovery, new service requests should be admitted and processed in a timely manner. Given that complex systems are constructed from many components, it is sensible to investigate how individual components can facilitate recovery and also satisfy availability requirements. The component presented is a search tree data structure that can recover from any disruption: it is a self-stabilizing data structure. No matter how severe the damage to its internal state, new operations on the data structure behave properly and the responses to operations are accurate indicators of any change to the search tree, even as the search tree recovery is underway. This paper resolves, for the first time, issues of dynamic allocation and pointer organization in a stabilizing data structure. After any sequence of O(m) operations in an arbitrary initial search tree of m nodes, the tree becomes balanced, all operations have O(lg n) running time, and free chains are adequate to supply new nodes for insertions. To meet availability constraints, operations have O(lg K) running time during periods of recovery, where K is the maximum number of items that the data structure can contain.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133495333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Autonomous data consistency technique through fair evaluation among heterogeneous systems 基于异构系统间公平评价的自主数据一致性技术
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917450
I. Kaji, S. Kato, K. Mori
{"title":"Autonomous data consistency technique through fair evaluation among heterogeneous systems","authors":"I. Kaji, S. Kato, K. Mori","doi":"10.1109/ISADS.2001.917450","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917450","url":null,"abstract":"By integrating heterogeneous systems with different individual requirements, it becomes possible for application systems to use the various data generated in the heterogeneous systems. Integrated systems also make it possible to process the applications from different points of view and to obtain higher assurance levels. The important requirements for the integration of application systems are not to halt the entire systems, not to violate individual system missions and to derive a synergetic effect. The autonomous decentralized system (ADS), by its online property, enables the integration of systems without stopping any system and without violating any system's mission. To collect consistent data combinations from different systems each subsystem needs to determine the combination independently and autonomously. This paper proposes a new concept, the data alliance, to determine consistent data combination from heterogeneous systems. In addition, the fairness must be maintained between the subsystems to achieve the consistency to satisfy the nature of the autonomous coordinability. This paper defines the fairness among systems in terms of the cost of the data freshness and the alliance waiting time. The data freshness value expresses the degree of how recent the data combination is for the subsystem, and the alliance waiting time expresses how long the subsystem must wait to get agreement among cooperating applications. The last part of the paper shows by simulation that the proposed technique is effective in different system topologies.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal analysis of e-commerce protocols 电子商务协议的形式化分析
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917391
M. Papa, O. Bremer, John Hale, S. Shenoi
{"title":"Formal analysis of e-commerce protocols","authors":"M. Papa, O. Bremer, John Hale, S. Shenoi","doi":"10.1109/ISADS.2001.917391","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917391","url":null,"abstract":"The paper presents a formalism for the analysis of e-commerce protocols. The approach integrates logics and process calculi, providing an expressive message passing semantics and sophisticated constructs for modeling principals. A common set of inference rules for communication, reduction and information analysis supports proofs about message passing, the knowledge and behavior of principals, and protocol properties. The power of the formalism is illustrated with an analysis of the NetBill Protocol.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134543981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Concepts and architecture of a security-centric mobile agent server 以安全为中心的移动代理服务器的概念和体系结构
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917449
Volker Roth, Mehrdad Jalali-Sohi
{"title":"Concepts and architecture of a security-centric mobile agent server","authors":"Volker Roth, Mehrdad Jalali-Sohi","doi":"10.1109/ISADS.2001.917449","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917449","url":null,"abstract":"Mobile software agents are software components that are able to move in a network. They are often considered as an attractive technology in electronic commerce applications. Although security concerns prevail. We describe the architecture and concepts of the SeMoA server-a runtime environment for Java-based mobile agents. Its architecture has a focus on security and easy extendability, and offers a framework for transparent content inspection of agents by means of filters. We implemented filters that handle agent signing and authentication as well as selective encryption of agent contents. Filters are applied transparently such that agents need not be aware of the security services provided by the server.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125101234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Autonomous navigation in information service systems for load balancing user demands 基于负载均衡的信息服务系统自主导航
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917453
H. Arfaoui, K. Mori
{"title":"Autonomous navigation in information service systems for load balancing user demands","authors":"H. Arfaoui, K. Mori","doi":"10.1109/ISADS.2001.917453","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917453","url":null,"abstract":"Autonomous information service system is a proposition made to cope with the continuously changing conditions of service provision and utilization in current information systems. The faded information field (FIF), sustained by Push/Pull mobile agent technology, is such a distributed architecture that brings high-assurance of the system through a balanced selective replication of the information. When the demand changes, the information environment is restructured so that the same access time to services for all unspecified users can be achieved in the system. However once the structure is fixed, balancing the incoming demand on the FIF is still required to guarantee the equal access time. Our goal is to warrant the autonomous dispatching of the Pull mobile agents to adjust the demand to the current information environment. We explain the concepts and realization of autonomous navigation under the goal of asynchronous load balancing of the pull mobile agent volume inside the FIF structure. The effectiveness of our algorithm has been confirmed by simulation.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129210733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The need for verification and validation techniques for adaptive control system 对自适应控制系统验证技术的需求
Proceedings 5th International Symposium on Autonomous Decentralized Systems Pub Date : 2001-03-26 DOI: 10.1109/ISADS.2001.917431
B. Cukic
{"title":"The need for verification and validation techniques for adaptive control system","authors":"B. Cukic","doi":"10.1109/ISADS.2001.917431","DOIUrl":"https://doi.org/10.1109/ISADS.2001.917431","url":null,"abstract":"Adaptive systems are systems whose function evolves over time, as they improve their performance through learning. The advantage of adaptive systems is that they can, through judicious learning, react to situations that were never individually identified and analyzed by the designer. If learning and adaptation are allowed to occur after the control system is deployed, the system is called an online adaptive system. Online adaptive systems are attracting increasing attention in application domains where autonomy is an important feature, or where it is virtually impossible to analyze ahead of time all the possible combinations of environmental conditions that may arise. An archetype of the former are long term space missions where communication delays to ground stations are prohibitively long, and we have to depend on the systems' local capabilities to deal with unforeseen circumstances. An archetype of the latter are flight control systems, which deal with a wide range of parameters, and a wide range of environmental factors. In recent years NASA conducted experiments evaluating adaptive computational paradigms (neural networks, AI planners) for providing fault tolerance capabilities in control systems following sensor and/or actuator faults. Experimental success suggests significant potential for future use. The critical factor limiting wider use of neural networks and other soft-computing paradigms in process control applications, is our (in)ability to provide a theoretically sound and practical approach to their verification and validation.","PeriodicalId":193918,"journal":{"name":"Proceedings 5th International Symposium on Autonomous Decentralized Systems","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124625396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信