The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
MPX implements hardware accelerated support for detection and prevention of memory corruption. This paper will examine the effectiveness of MPX. Herein we attempt to find false positives and false negatives, and to determine what attacks may still be feasible. In particular we wish to see if a system protected by MPX is still exploitable. Intel MPX appears to provide a solid mitigation technique,...
The Internet of Things (IoT) is an emerging trend that generates many new challenges in security and privacy through the interconnect of ubiquitous devices and services over the Internet. Depending on the device and its strict constraints in the IoT, one often needs to refrain from implementing costly public key cryptography to solve the key distribution problem. In this context, Physical Unclonable...
Timely risk assessments allow organizations to gauge the degree to which cyber attacks threaten their mission/business objectives. Risk plots in such assessments typically include cyber attack likelihood values along with the impact. This paper describes an algorithm and an associated model that allow for estimation of one aspect of cyber attack likelihood, attack level of effort. The approach involves...
Products are facing numerous changes, both during their development and especially during their usage phase. Reasons for this arise from changes in markets, customer demands, laws and regulations as well as society or technology advancement after products are launched. This leads to minor updates or evolutions of the offered products during their life cycle. As a product is mostly offered in different...
A significant body of research exists about instilling a culture of innovation, but less is written about how to introduce innovation into systems engineering practices. Further, can suppress innovation. Our increasing need to conceive and develop more transformative concepts motivated an initiative to infuse innovation into our systems engineering. In particular, we introduce innovation into concept...
The fragility created by hierarchical organizational constructs crosses over into the design of many large scale IT systems that are distributed across an enterprise. This means, that for these systems, end-to-end system design comes from the top down, creating a situation in which all fragility rises up to the largest scales of the system; this is a result of these systems being centrally controlled,...
Platform-based product families have become an important strategy in many industries as a wide range of products can be offered to the customers while achieving economies of scale in design and manufacturing. During the life cycle of a product family, the amount of derived product variants increase due to numerous internal and external driven reasons. This leads to additional complexity within the...
Determining a systems design, analysis or approach to be of high or low quality remains a subjective assessment. Our field requires the ability to objectively grade the quality of a systems approach in advance of implementation and then correlate that assessment with outcomes.
The current study deals with the development of systems thinking among systems engineers. The goals of the study are to identify the factors that influence the development of systems thinking among systems engineers and to find ways to encourage this development. This study is part of the effort of a full range of studies, which combine different disciplines, are being conducted among a number of...
Axiomatic Design Theory is a general framework for system design process based on mapping between several domains. In the Axiomatic Design theory, only the functional requirements (systems' functions) are considered in the design process, since the mapping between requirements and design parameters in Axiomatic Design does not include non-functional requirements (systems' attributes). This paper introduce...
Timing behavior predictability is a necessary real-time requirement for future switched Ethernet-based networks in the automotive and similar domains. Schedulability of such safety- and time-critical networks has to be guaranteed. The paper proposes a system architecture for future Ethernet-based advanced driver assistance systems (ADAS) and analyzes its timing requirements on transmission and forwarding...
Model-Based Systems Engineering (MBSE) gained momentum within the last years and is regarded as the key to face the challenges of product engineering. Nevertheless, numerous barriers exist that inhibit the implementation of MBSE in industrial application. One is about what constitutes MBSE - up to now there is no single view on this topic. This is due to the numerous disciplines involved in the enhancements...
In model-based systems engineering, systems are built as models. Models are abstractions, since they are not the real physical parts, but a data representation of then in a computer. As such, it is tempting to establish a methodology and a system in which models can be shared among projects. When an engineer creates new models of components in a new project, her past experience in making similar components,...
The involvement of multiple stakeholders in the design of complex engineered system presents many challenges. One of the challenge is that the overlapping stakeholder concerns leads to semantic relationships appearing between models. From an inconsistency management perspective, it is critical to investigate how these relationships appear and what are their types. Based on a decision-theoretic foundation,...
Timing is critical to engineering changes for data center project management (DCPM). The intent is to enable data center project (DCP) to deal with change proactively, not reactively. Design freeze is one of the project management techniques applied for governing the systems engineering part of DCP. The role of design freeze in DCPM is to reduce uncertainty in business requirements, technical specs...
In industry, embedded systems continue to become even more complex. The development is done increasingly in a virtual environment to accelerate the prototyping and the implementation. Independent from this fact, testing is still the essential activity for verification and validation and obtaining confidence in the quality and reliability of the product. The main driver behind innovation is software,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.