The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents monitoring as a service for networked medical cyber-physical systems in the operating room based on the recent IEEE 11073 standards for interoperable medical device communication. Runtime Verification techniques are used to allow for a formal specification and verification. Based on the specification so called monitors are automatically synthesized. At runtime, the monitors observe...
In recent years, there has been a shift from closed systems, with clearly defined borders, whose behavior is completely determined a priori, towards open systems. An open system is an independently developed system, which is able to communicate and cooperate with other open systems in an ad-hoc manner, at runtime. Moreover, due to their openness, such systems may be used in various contexts. Whenever...
The full behavior of software-intensive systems of systems (SoS) emerges during operation only. Runtime monitoring approaches have thus been proposed to detect deviations from the expected behavior. They commonly rely on temporal logic or domain-specific languages to formally define requirements, which are then checked by analyzing the stream of monitored events and event data. Some approaches also...
Formal verification serves as the theoretical basis for the engineering task of correctness and performance (quality) assurance. State of the art model checking, automatic specification refinement and theorem proving are employed to tackle the often undecidable (as imposed by the halting problem) task of complete verification. In this paper we formalize, prove and demonstrate a new unobtrusive way...
Development and operation of multi-cloud applications, i.e. applications which consume and orchestrate services from multiple independent Cloud Service Providers, are challenging topics nowadays. Systematically addressing security assurance in such applications is an additional issue, unsolved at state of art. This paper introduces the MUSA DevOps approach to holistic security assurance in multi-cloud...
Cooperation of vehicular systems is the stepping stone towards both road and indoor smart transportation systems. It aims at increasing transportation efficiency and safety compared to the stand-alone vehicular systems. The usage of wireless communication as the foundation of such safety-critical cooperation needs to be embraced with all its benefits and flaws compared to the wired communication....
Large scale observatories are shared-use resources that provide open access to data from geographically distributed sensors and instruments. This data has the potential to accelerate scientific discovery. However, seamlessly integrating the data into scientific workflows remains a challenge. In this paper, we summarize our ongoing work in supporting data-driven and data-intensive workflows and outline...
Industrial software systems are often systems of systems (SoS) whose full behavior only emerges at runtime. The systems and their interactions thus need to be continuously monitored and checked during operation to determine compliance with requirements. Many requirements monitoring approaches have been proposed. However, only few of these come with tools that present and visualize monitoring results...
Runtime Verification consists in studying a system at runtime, looking for input and output events to discover, check or enforce behavioral properties. Interactive debugging consists in studying a system at runtime in order to discover and understand its bugs and fix them, inspecting interactively its internal state.Interactive Runtime Verification (i-RV) combines runtime verification and interactive...
Bugs cannot always be avoided and can have various consequences on the reliability of softwares. Techniques for finding and undestanding bugs are therefore needed for developers to be able to fix them. Existing techniques for finding and getting insight on bugs have limitations. Static analysis cannot detect every bugs, Interactive Debugging can be tedious, Runtime Verification usually does not have...
Security in embedded systems remains a major concern. Untrustworthy authorities use a wide range of software attacks. This demo introduces ARMHEx, a practical solution targeting DIFT (Dynamic Information Flow Tracking) implementations on ARM-based SoCs. DIFT is a solution that consists in tracking the dissemination of data inside the system and allows to enforce some security properties. In this demo,...
Prioritization of non-functional requirements (NFRs) is a research field that needs more attention. We demonstrate ARRoW, a novel approach for automatic runtime reappraisal and update of the weights of NFRs given new evidence collected from the environment during the execution of the system. In this paper, we showcase how ARRoW is used in an substantial industrial case study. Our results shows how...
Malware is a widespread problem and despite the common use of anti-virus software, the diversity of malware is still increasing. A major challenge facing the anti-virus industry is how to effectively detect thousands of malware samples that are received every day. In this paper, a novel approach based Run Length Encoding (RLE) algorithm and n-gram are proposed to improve malware detect on dynamic...
Most applications running on supercomputers achieve only a fraction of a system's peak performance. It has been demonstrated that the co-scheduling of applications can improve the overall system utilization. However, following this approach, applications need to fulfill certain criteria such that the mutual slowdown is kept at a minimum. In this paper, we present an HPC scheduler that applies co-scheduling...
[Context/Motivation] Decision-making for self-adaptive systems (SAS) requires the runtime trade-off of multiple non-functional requirements (NFRs) and the costs-benefits analysis of the alternative solutions. Usually, it requires the specification of weights for NFRs and decision-making strategies. Generally, these weights are defined at design-time with the support of previous experiences and domain...
Because data collection in HPC systems happens on the nodes and is easily related to the job running on the node, tools presenting the data and subsequent analyses to the user generally present them at the job level. Our position is that this is the wrong level of abstraction and thus limits the value of the analyses, often dissuading users from using any of the offered tools. In this paper we present...
The current management techniques of large scale cloud systems are inefficient, and lead to high operational costs. In this paper, we present a cross-layer management framework that overcomes the current IT management challenges of cloud systems and their applications. The proposed framework monitors and performs holistic analysis of the cloud system resource utilization from the physical layer, the...
Knowledge of power consumption at a subsystem level can facilitate adaptive energy-saving techniques such as power gating, runtime task mapping and dynamic voltage and/or frequency scahng. While we have the ability to attribute power to an arbitrary hardware system's modules in real time, the selection of the particular signals to monitor for the purpose of power estimation within any given module...
Fine-grained runtime power management techniques could be promising solutions for power reduction. Therefore, it is essential to establish accurate power monitoring schemes to obtain dynamic power variation in a short period (i.e., tens or hundreds of clock cycles). In this paper, we leverage a decision-tree-based power modeling approach to establish finegrained hardware power monitoring on FPGA platforms...
Continuous evolution of virtualization-related technologies have benefit greatly flexibility and reliability of software system. However, although virtualization removes binding between application and server underneath, it complicates the regular runtime hierarchy into an intricate structure, where cross-layer monitoring and holistic evaluation becomes challenging. Currently lots of monitoring practices...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.