The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present AnomalyDetect, an approach for detecting anomalies in cloud services. A cloud service consists of a set of interacting applications/processes running on one or more interconnected virtual machines. AnomalyDetect uses the Kalman Filter as the basis for predicting the states of virtual machines running cloud services. It uses the cloud service's virtual machine historical data...
Security challenges in cloud environments remain largely catastrophic due to the nature of the cloud; complex, heterogeneous, widely accessible over the internet, and virtualised resource sharing. Static and boundary-based conventional security approaches are clearly not effective as the sole countermeasures. Instead, countermeasures need to be intelligent with a high degree of autonomous, self-managing...
This paper focuses on the design and implementation of an Intelligent Cyber Security Assistant (ICSA) architecture that would provide intelligent assistance to a human security specialist. The ability to focus on rapidlydeveloping malicious events which have the most impact on the normal operations of cyber resources and services is both critical and challenging. Effectively responding tocyberattacks,...
Connected vehicles will likely use hybrid communication networks. Presumably a licence-free radio access technology (RAT) will be used for vehicle-to-vehicle (V2V) contact, complemented by a cellular network, with an associated usage cost. In previous work, we developed a self-adaptive clustering algorithm for reducing cellular access costs, while ensuring that clustering overheads do not saturate...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Self-adaptation is nowadays recognized as an effective approach to manage the complexity and dynamics inherent to cyber-physical systems, which are composed of deeply intertwined physical and software components interacting with each other. A self-adaptive system typically consists of a managed subsystem and a managing subsystem that implements the adaptation logic by means of the well established...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Estimating collective state is an important component of many distributed systems, but has inherent challenges in balancing the availability of estimates against their accuracy. In this paper, we analyze the error bounds and dynamics of a commonly used family of self-stabilizing state estimation algorithms based on spanning trees. We find that in the worst case transients can duplicate values leading...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Heterogeneous agents that cooperate to accomplish collective tasks constitute Collective Adaptive Systems (CAS). Engineering a CAS not only involves the definition of the individual agents, but also their roles in achieving a collective task and adaptation strategies to counteract to environmental changes. Current solutions for specifying CAS typically tackle the problem at a low level of abstraction...
Networked embedded software systems incorporate varying degrees of adaptation behavior to sustain their operations with acceptable quality of service (QoS), in the face of hostile external events. For instance, a highly agile cruise control system of a car may dynamically adjust its controller parameters to generate a higher-than-normal increase in torque when encountering a higher road elevation...
Future smart computing environments will heavily rely on the collaboration of services, which are dynamically interconnected to Smart Service Systems in order to develop their full potential. Such computing environments are coined by a high degree of distribution and decentralization rendering a centralized control of service composition and system adaptation infeasible. Self-organizing Software Systems...
In the past decades there was an exponential growth of computer networks and computing devices, connecting computers with a size in the m3 range. The Internet-of-Things (IoT) emerges connecting everything, demanding for new distributed computing and communication approaches. Currently, the IoT connects devices with a size in the cm3 range. But new technologies enable the integration of computing in...
Due to the fundamental trade-off between quality and timeliness of planning, designers of self-adaptive systems often have to compromise between an approach that is quick to find an adaptation plan and an approach that is slow but finds a quality adaptation plan. To deal with this trade-off, in our previous work, we proposed a hybrid planning approach that combines a deliberative and a reactive planning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.