{"title":"Modeling System Safety Requirements Using Input/Output Constraint Meta-automata","authors":"Zhe Chen, G. Motet","doi":"10.1109/ICONS.2009.24","DOIUrl":"https://doi.org/10.1109/ICONS.2009.24","url":null,"abstract":"Most recent software related accidents have been system accidents. To validate the absence of system hazards concerning dysfunctional interactions, industrials call for approaches of modeling system safety requirements and interaction constraints among components and with environments (e.g., between humans and machines). This paper proposes a framework based on input/output constraint meta-automata, which restricts system behavior at the meta level. This approach can formally model safe interactions between a system and its environment or among its components. This framework differs from the framework of the traditional model checking. It explicitly separates the tasks of product engineers and safety engineers, and provides a top-down technique for modeling a system with safety constraints, and for automatically composing a safe system that conforms to safety requirements. The contributions of this work include formalizing system safety requirements and a way of automatically ensuring system safety.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133048789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harald Krapfenbauer, Dominik Ertl, H. Kaindl, Jürgen Falb
{"title":"Support for Programming Embedded Software with Dynamically Typed Languages","authors":"Harald Krapfenbauer, Dominik Ertl, H. Kaindl, Jürgen Falb","doi":"10.1109/ICONS.2009.15","DOIUrl":"https://doi.org/10.1109/ICONS.2009.15","url":null,"abstract":"The support for programming embedded software still lags behind the support for PCs. In particular, dynamically typed languages are not yet widely available for embedded systems. The work presented in this paper shows how we support embedded software programming by bringing the benefits of dynamically typed languages to embedded systems.Dynamically typed languages are particularly suitable for rapid prototyping of software and boost the time to-market. It is common to have rich tool sets available for developing PC software. So, we strive for similar programming support for embedded software and present an implemented and integrated development environment. It supports the dynamically typed language Python.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nine Robot´s Morris: A Challenge for Self-Organizing Robot Teams","authors":"H. Mueller","doi":"10.1109/ICONS.2009.29","DOIUrl":"https://doi.org/10.1109/ICONS.2009.29","url":null,"abstract":"The game of Nine Men´s Morris will be introduced as a game played by two teams of nine robots each. In the Nine Robot´s Morris version the robots coordinate themselves autonomously during the entire game. The general idea, the hardware setting, different realizations, and challenging open questions will be presented.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122499057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FPGA Based High Date Rate Radio Interfaces for Aerospace Wireless Sensor Systems","authors":"J. Henaut, D. Dragomirescu, R. Plana","doi":"10.1109/ICONS.2009.28","DOIUrl":"https://doi.org/10.1109/ICONS.2009.28","url":null,"abstract":"This paper gives an overview of development and prototyping of a radio interface designed for high data rate Wireless Sensor Networks (WSN) using a top down approach. An aerospace application of this work is presented to underline the importance of rapid and flexible prototyping. Single Carrier Frequency division multiple Access (SC-FDMA), with a very low Peak Average Power Ratio (PAPR), is a promising alternative to the OFDM scheme for highly power constraint applications, however, it is still not well explored. The chosen radio interface will be tested by means of Electronic System Level (ESL) synthesis and Field Programmable Gate Array (FPGA) prototyping.The ESL development is based on the tool “Synplify DSP”, which allows quick prototyping and makes it possible to do real measurements, thus increasing the knowledge about the propagation channel to update the model and algorithms","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"223 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133300812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-Based Access Control in an Adaptive Hypermedia System","authors":"Pedro Ballesteros, Y. Donoso","doi":"10.1109/ICONS.2009.43","DOIUrl":"https://doi.org/10.1109/ICONS.2009.43","url":null,"abstract":"Nowadays Internet and web applications handle a large amount of people’s information. In most of the cases, this data is sensitive in security issues and has to be handled with care, but it is also very important to know what the users’ profiles and presentation preferences are, in order to show them what they need and want. Many applications solve the problems of adapting the information to the user’s profile or performing a secure data manipulation, but neither of these methods solves both problems at the same time. In this document we show the development of a project which provides an alternative to separated solutions, integrating two of the best applications attacking by their own the problems mentioned before. In addition, we show an example made to test if the integration was successfully.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130426193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMS Vertical Handover Optimization Based on Network Resources","authors":"Claudia Arezio Ricardo","doi":"10.1109/ICONS.2009.51","DOIUrl":"https://doi.org/10.1109/ICONS.2009.51","url":null,"abstract":"Transition to convergent systems built over the IMS architecture should attempt to service availability and mobility requirements in heterogeneous technologies. Mobility solution on IMS should allow operators delivering network resources related to handoff policies beyond triggering only by power strength as done so far. This paper reviews emerging heterogeneous access networks and their integration, discussing relevant metrics to mobility which indicates resource availability in a way to support vertical handover decision in networks deployed over IMS. The selected architecture is under evaluation in a simulation environment. The results are used to build up an analysis of the solution and drown up some conclusions.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131423743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault Management for Secure Embedded Systems","authors":"M. Svéda","doi":"10.1109/ICONS.2009.12","DOIUrl":"https://doi.org/10.1109/ICONS.2009.12","url":null,"abstract":"This paper describes principles of an embedded system design propping safety and security using a dedicated architecture. After reviewing a simple specification language deployed, the main attention is focused on hardware architecture, software, and communication services that fit application requirements. The gasoline dispenser controller presents in this case a real-world solution of a safety and security critical embedded system application. The paper stresses those features that distinguish the real project from a demonstration case study.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"103 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131653314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Intrusion Detection System for Automation Devices within Virtual Automation Network","authors":"R. Kuchta, J. Kadlec, R. Vrba","doi":"10.1109/ICONS.2009.34","DOIUrl":"https://doi.org/10.1109/ICONS.2009.34","url":null,"abstract":"Security incidents are becoming more serious and more common not only in computer networks, but also in automation networks. Automation devices are still more and more based on computers and they have the same weak points like standard computers. Actual trends in automation networks are among others wide automation networks covering several manufacture divisions or remote controlling of automation networks through the Internet. Necessity of the remote connection to the automation networks covers all security vulnerabilities and risks which originate from the Internet. Analogically the automation network can be secured by the conventional way through firewalls and VPN tunnels. For this reason new automation firewall device was designed. The VAN firewall includes messaging system for logging all events and alerts. As a basis for VAN (Virtual Automation Network) firewall messaging system IDMEF (Intrusion Detection Message Exchange Format) is used. This paper describes the intrusion detection system and its implementation within the VAN.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114506090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Sensitivity of Deadlines with a Specific Asynchronous Scenario for Harmonic Periodic Tasks scheduled by FP","authors":"P. Yomsi, Y. Sorel, D. D. Rauglaudre, L. George","doi":"10.1109/ICONS.2009.36","DOIUrl":"https://doi.org/10.1109/ICONS.2009.36","url":null,"abstract":"The aim of this paper is to address the problem of correctly dimensioning real-time embedded systems. It is well known that computers which control systems are greatly affected by delays and jitter occurring in the control loop. In the literature, a deadline reduction approach has been considered as one solution to reducing the jitter experienced by a task and therefore obtaining better loop stability in the control loop. Here, in order to improve the sensitivity of the deadlines, we propose another solution for reducing the deadline of a task when all tasks are scheduled with the Deadline Monotonic Algorithm. This is performed for a specific asynchronous scenario for harmonic periodic tasks. We compare the results to those for the synchronous scenario.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"2 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127716669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. McBurney, E. Papadopoulou, N. Taylor, M. H. Williams
{"title":"Implicit Adaptation of User Preferences in Pervasive Systems","authors":"S. McBurney, E. Papadopoulou, N. Taylor, M. H. Williams","doi":"10.1109/ICONS.2009.19","DOIUrl":"https://doi.org/10.1109/ICONS.2009.19","url":null,"abstract":"User preferences have an essential role to play in decision making in pervasive systems. However, building up and maintaining a set of user preferences for an individual user is a nontrivial exercise. Relying on the user to input preferences has been found not to work and the use of different forms of machine learning are being investigated. This paper is concerned with the problem of updating a set of preferences when a new aspect of an existing preference is discovered. A basic algorithm (with variants) is given for handling this situation. This has been developed for the Daidalos and Persist pervasive systems. Some research issues are also discussed.","PeriodicalId":270103,"journal":{"name":"2009 Fourth International Conference on Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129954863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}