The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) is a new networking paradigm which provides better decoupling between control plane and data plane. The separation not only allows OpenFlow (OF) switches in the data plane simply to forward data, but also enables the centralized programmable controller to control the behavior of entire network. SDN makes it possible to manage the network more flexible and simple....
The design of today's systems on chip (SoC's) raises difficult issues, in particular regarding verification. In their early design phases, hardware/software embedded systems are commonly described as ESL (Electronic System Level) models, such that their functional and transactional behavior can be analyzed by simulation. To enhance this validation process, we have previously developed a framework...
A major challenge for the European electronic industry is to enhance productivity while reducing costs and ensuring quality in development, integration and maintenance. Model-Driven Engineering (MDE) principles and techniques have already shown promising capabilities but still need to scale to support real-world scenarios implied by the full deployment and use of complex electronic components and...
Runtime hardware Trojan detection techniques are required in third party IP based SoCs as a last line of defense. Traditional techniques rely on golden data model or exotic signal processing techniques such as utilizing Choas theory or machine learning. Due to cumbersome implementation of such techniques, it is highly impractical to embed them on the hardware, which is a requirement in some mission...
The interconnection of several web services into single composite web services is known as Web Service Composition (WSC). WSC can be implemented in three different ways such as static, semi-dynamic and dynamic. In this research, the dynamic web service composition is accentuated as it is the most challenging method where it occurs during run time to fulfill the business process requirement. Too many...
In job-centric monitoring, monitors gather series of measurements, e.g., the used CPU load, per job. In domains where jobs are expected to behave similar, job-centric monitoring allows detecting misbehaving jobs based on a reference series of measurements. However, current detection approaches neglect time-drifts in series, e.g., caused by different CPU speeds and therefore potentially cause false...
Mainstream FPGAs and programmable SoCs employ different countermeasures during configuration and runtime to mitigate physical attacks. However, it has been demonstrated that sophisticated active attack techniques, such as laser voltage probing, can still bypass the bitstream protections during the configuration phase. On the other hand, although the security monitoring IP cores provided by FPGA vendors...
Improving safety of patient care is an ultimate objective for medical systems. Though many medical best practice guidelines exist and are in hospital handbooks, they are often lengthy and difficult for medical professionals to remember and apply clinically. Hence, developing safe and correct medical best practice guideline systems is an urgent need. Many efforts have been made in modeling, clinical...
Cloud computing has expanded rapidly as a promising technology in the recent years and has drastically altered the majority of opinions about computing mode and application deployment. While the cloud has been proved to improve efficiency and earn benefit for a great number of various services providers, yet a good few enterprises still hesitate to move to the cloud because of security threats. In...
High quality requirements are set for automated production systems (aPS) as malfunctions can harm humans or cause severe financial loss. These malfunctions can be caused by faults in the control software of the aPS or its inability to correctly identify and handle unintended situations and errors in the technical process or hardware behavior. To achieve more dependable control software, software testing...
Several approaches to protect data and code, and ensure execution in a secure environment without getting infected from malwares, such as isolation, sandboxing, trust-based execution, application oriented access control have been proposed. In recent times, hardware-based solutions like ARM TrustZone and Intel SGX Enclave have been introduced to protect code and data from being infected or modified...
User interfaces which adapt based on usage patterns, for example based on frequency of use of certain features, have been proposed as a means of limiting the complexity of the user interface without specialising it unnecessarily to particular user profiles. However, from a software engineering perspective, adaptive user interfaces pose a challenge in code structuring, and separation of the different...
For runtime verification techniques, the most important part that limits its usage is how to reduce the influence of monitors. An important indicator is the amount of software codes after monitor instrumentation. The application of RV is hindered from the size-explosion problem of monitor construction. Namely, the state number of the monitor obtained is doubly exponential in the size of the input...
Autonomic Computing and self-adaptive systems are a response to the increasing complexity required to cope with changing environments and varying system resources. However, the complexity of the adaptation logic itself increases with the available information in particular for distributed systems. This leads to uncertainty at runtime resulting in incompleteness in the representation of adaptation...
We are currently witnessing an evolution towards network virtualization and Software Defined Networking (SDN) paradigm. SDN permits the decoupling of the control and data planes of traditional networks, and offers flexible and programmable networks. Besides, the need for dynamic provisioning and composition of networking services leads to the deployment of software components on virtualized network...
With the increasingly application of discrete control software in automatic control field, the security and reliability of its behavior becomes even more essential. However, the traditional verification methods are of high complexity and poor flexibility, so the lightweight Runtime Verification becomes an alternative. In this paper, aiming at real-time properties in discrete control software, an improved...
Service Function Chaining (SFC) serves the traffic of a specific service along an ordered set of Service Functions (SFs). SFC uses Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies to reach the deployment and removal of SFC in an appropriate time with minimal costs. However, during the life time of deployed SFCs, the SFs are exposed to the risk of overloading,...
Mobile Devices offer enriched services and information for the end users. Achieving security in such a dynamic and heterogeneous environment is a challenging task. Hence, adaptive security is an applicable solution for this challenge. It is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. In...
Internet of Things (IoT) services are increasingly deployed at the edge to access and control Things. The execution of such services needs to be monitored to provide information for security, service contract, and system operation management. Although different techniques have been proposed for deploying and executing IoT services in IoT gateways and edge servers, there is a lack of generic policy...
Service systems in upcoming application domains like the Internet of Things (IoT) have a high demand for dynamic changes of provided service quality and related pricing. Changes can be requested by service consumers to address adjusted requirements at application level or by service providers to accommodate resource constraints. Anyway, traditional approaches to handle Service Level Agreements (SLA)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.