The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, dependability is of paramount importance in modern distributed storage systems. A challenging issue to deploy a storage system with certain dependability requirements or improve existing systems' dependability is how to comprehensively and efficiently characterize the dependability of those systems. In this paper, we present a two-layer Hidden Markov Model (HMM) to characterize the dependability...
Medical devices are essential for the practice of modern medicine, and the standard open-source integrated clinical environment (OpenICE) has been well designed and widely adopted to improve their interoperability. With OpenICE, it is easy to connect individual devices into the integrated clinical system to provide a coherent patient care. In this paper, we present ICERV, the first online verification...
This paper presents dependable parallel multipopulation differential evolutionary particle swam optimization (DEEPSO) for voltage and reactive power control (VRPC) in electric power systems. Considering large penetration of renewable energies and deregulated environment of power systems, VRPC requires fast computation even for larger-scale problems. One solutions to increase the computation speed...
This paper addresses the generation of stochastic models for dependability and performability analysis of complex systems, through automatic replication of template models. The proposed solution is tailored to systems composed by large populations of similar non-anonymous components, interconnected with each other according to a variety of topologies. A new efficient replication technique is presented...
Emerging technologies in communication (5G) and its use in new industrial automation approaches (smart manufacturing) require more than today precise specifications of dependability requirements and assurance at the interface between application and communication. The growing role of dependability assessment for wireless automation is addressed. First an overview is given over general definitions...
In safety-critical cyber-physical systems, analog front-ends combined with many-processors are being increasingly employed. An example is an imminent collision detection chip for cars. Such a complex system requires zero downtime and a very high dependability despite aging issues under harsh environmental conditions. By on-line monitoring the health status of the processor cores and taking appropriate...
Cloud computing is revolutionizing how organizations treat computing resources. The privileged virtual machine is a key component in systems that use virtualization, but poses a dependability risk for several reasons. The activation of residual software faults that exist in every software project is a real threat and can impact the correct operation of the entire virtualized system. To study this...
This paper proposes dependable multi-population differential evolutionary particle swarm optimization (DEEPSO) for optimal operational planning of energy plants. The problem can be formulated as a mixed integer nonlinear optimization problem (MINLP). Optimal operational planning of numbers of energy plants are calculated simultaneously in a data center. Therefore, the problem is required to generate...
The increasing replacement of mechanical parts by x-by-wire systems in automotive applications allows improving driver safety. These systems demand highly dependable sensors that ensure their functionality despite the harsh operating conditions. This means that the sensors should be capable of working continuously despite catastrophic faults and keeping the performance over time. An anisotropic magnetoresistance...
Security vulnerabilities in system software are a major concern, especially when the software is highly exposed. This paper studies whether it is possible to emulate security vulnerabilities through software fault injection by using well known emulation operators. Emulating security vulnerabilities in the C programming language, in a realistic way using field data, is an unanswered research question,...
In an era of continuously shrinking technology and escalating power density, Multiprocessor System on Chips (MPSoCs) suffer from a growing prominence of device defects and increase of dependability-related issues. This paper tackles the dependability challenge by suggesting an adaptive reliability enhancement strategy for multicore systems. We dynamically adapt the reliability enhancement to the actual...
Network virtualization is a promising solution to overcome the resistance to architectural changes in Internet, and virtual network embedding (VNE) is a remarkable challenge. Virtualization makes possible resource sharing as an effective energy saving technology, but few works consider energy consumption in the mapping. In addition, important QoS metrics, such as availability, are usually neglected...
The problem of dependability assessment can be solved analytically just under predefined conditions. If they do not hold, alternative approaches must apply. Widely, they rely on the Monte Carlo simulation, suffering by the high computational complexity. Some rest on further instruments such as probabilistic timed automata that have been shown to be efficient to solve problems in various areas. However,...
Wireless Sensor Networks are nowadays employed in several applications. Cyber-physical systems, health-care instruments and Internet of Things are using hundreds of smart sensors, which include also processing capability together with sophisticated communication protocols. The presence of faults in these critical applications must be checked during runtime, to detect transient and permanent faults...
Communication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the...
In this paper, we propose and implement two electronic control unit (ECU) architectures for real-time automotive cyber-physical systems that incorporate security and dependability primitives with low resources and energy overhead. These ECUs architectures follow the multiprocessor system-on-chip (MPSoC) design paradigm wherein the ECUs have multiple heterogeneous processing engines with specific functionalities...
Software-defined networking (SDN) has recently attracted interest as a way to provide cyber resiliency because of its programmable and logically centralized nature. However, the security of the SDN architecture itself against malicious attacks is not well understood and must be ensured in order to provide cyber resiliency to systems that use SDNs. In this paper, we present ATTAIN, an attack injection...
Coordination services are essential building blocks of today's data centers as they provide processes of distributed applications with means to reliably exchange data. Consequently, coordination services must deliver high performance to ensure that they do not become a bottleneck for the applications depending on them. Unfortunately, the design of existing services such as ZooKeeper prevents them...
This paper describes evaluation and consequent improvements in the field of dependability prediction from the beginning to nowadays. The necessity to determine the reliability characteristics of the electronic equipment is shown. The basic terms, definitions and current problems are described. The demonstration of the prediction of reliability parameters according to the MIL-HDBK-217 standard based...
Cyber-attacks and intrusions in cyber-physical control systems are, currently, difficult to reliably prevent. Knowing a system's vulnerabilities and implementing static mitigations is not enough, since threats are advancing faster than the pace at which static cyber solutions can counteract. Accordingly, the practice of cybersecurity needs to ensure that intrusion and compromise do not result in system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.