The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To design and implement secure web applications an analysis must start with an understanding of the risks to which application will be exposed. Business-centric Web applications need complex authentication policies to securely implement business processes. Threats against the confidentiality, availability and integrity of the data stored, processed and transmitted by application need to be matched...
There have been several attempts at correcting process variation induced errors by identifying and masking these errors at the circuit and architecture level. These approaches take up valuable die area and power on the chip. As an alternative, we explore the feasibility of an approach that allows these errors to occur freely, and handle them in software, at the algorithmic level. In this paper, we...
Networked control systems give rise to several new problems which need to be resolved for successful development of such control systems. One of the most important is to develop a software framework with appropriate architecture and mechanisms for rapid, reliable, and evolvable distributed control applications. In particular, timeliness in the interaction among entities which constitute the overall...
We study the problem of finding a finite bisimilar abstraction for a class of reactive untimed infinite-state systems, modeled as input-output extended finite automata (I/O-EFA). We identify a lower bound abstraction (that is coarser than any finite bisimilar abstraction), and present an iterative refinement algorithm whose termination guarantees the existence of a finite bisimilar abstraction. The...
Virtualization is a promising technology that has attracted much attention, particularly in the grid community. Recent advances using virtualization technologies enable multiplexing the physical resources by means of virtual machines resulting in better resource utilization. We have proposed virtual cluster development environment (VCDE) to dynamically form virtual cluster on demand providing the...
In this paper, it has been shown that computational jobs, such as encoding of input data and AND, OR operation, can work on the computers (by using computer databases and algorithms for the purpose of speeding up and enhancing biological research). By combining more complex functions, more complex molecular programs for gene analysis can be constructed. It is expected an in vivo (i.e. inside cellular...
Embedded control software reacts to plant and environment conditions in order to enforce a desired functionality, and exhibit hybrid dynamics: control-loops together with switching logic. Control software can contain errors (faults), and fault-tolerance methods must be developed to enhance system safety and reliability. We present an approach for fault detection and isolation that is key to achieving...
We propose a two-tiered hierarchical approach for detecting faults in embedded control software during their runtime operation: The observed behavior is monitored against the appropriate specifications at two different levels, namely, the software level and the controlled-system level. (The additional controlled- system level monitoring safeguards against any possible incompleteness at the software...
One of the widely used security mechanism for sensor network is the software-hardware implementation of cryptographic algorithms. If the confidential data is lost as a result of adversary effect, then the whole sensor network is prone to get exposed to the intruder. What we need is a strong mechanism, to protect such sensitive data. In this paper we present a technique where we mask all the intermediate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.