By Topic

10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems

2-4 Feb. 2005

Filter Results

Displaying Results 1 - 25 of 56
  • 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems

    Publication Year: 2005
    Request permission for commercial reuse | PDF file iconPDF (338 KB)
    Freely Available from IEEE
  • 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems - Title

    Publication Year: 2005, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems - Table of contents

    Publication Year: 2005, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Message from the Workshop Chairs

    Publication Year: 2005, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (100 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (118 KB) | HTML iconHTML
    Freely Available from IEEE
  • Workshop Committees

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • DoD towards software services

    Publication Year: 2005, Page(s):3 - 6
    Cited by:  Papers (18)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB) | HTML iconHTML

    Department of Defense is moving rapidly towards service-oriented computing (SOC) recently as evidence of DoD 5 projects such as network centric enterprise services (NCES), global information grid enterprise services (GES), and joint battle management command and control (JBMC2). SOC represents a completely new and emerging paradigm of computing instead of thinking in terms of products. Systems wil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges for critical embedded systems

    Publication Year: 2005, Page(s):7 - 9
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Over the past decade, the area of embedded systems has begun to emerge as a discipline in its own right. The scope of research has expanded from the problem of programming small, resource-constrained, embedded electronic devices, to span development of a new generation of complex, distributed, real-time systems. This is driven by increases in the technological capability of information platforms. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A role-based access control policy verification framework for real-time systems

    Publication Year: 2005, Page(s):13 - 20
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The temporal and event-based semantics of these applications can be expressed using event-driven role based access control (RBAC) model. Any comprehensive access control model such as RBAC requires verification and validation mecha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing DNS security using the SSL trust infrastructure

    Publication Year: 2005, Page(s):21 - 27
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed for DNS in terms of security and dependability. However, the current secure DNS (DNSSEC) standard has still several problems that need further consideration. For example, online update... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptable security framework for service-based systems

    Publication Year: 2005, Page(s):28 - 35
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to achieve the system goals, regardless of the programming languages and platforms used to develop and run these services. In these large-scale service-based systems, various capabilities are provided by different organization... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An RBAC framework for time constrained secure interoperation in multi-domain environments

    Publication Year: 2005, Page(s):36 - 45
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    In emerging e-commerce applications, time constrained information sharing between different systems is becoming a common phenomenon. A flexible and efficient mechanism is needed to support short term time-based sharing policies between transient partners. In particular, the interacting domains need to establish a time-based inter-domain access policy without violating the original time-based secur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Issues in providing quality of service in a joint battlespace infosphere

    Publication Year: 2005, Page(s):49 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB) | HTML iconHTML

    Military command and control systems rely on information that is timely, accurate, and in the correct form in order to make mission-critical decisions. Therefore these systems rely on having predictable quality of service, or QoS, for information creation, delivery, and processing. The joint battlespace infosphere, or JBI, is an information system architecture being developed to support the milita... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A real-time distributed scheduling service for middleware systems

    Publication Year: 2005, Page(s):59 - 65
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    The latest version of real-time CORBA defines a distributable thread primitive to support real-time computing in a dynamic distributed environment. However, this standard does not provide support for making and enforcing global decisions. This paper describes the framework for a distributed scheduling service (DSS) that provides globally sound decision-making and scheduling enforcement to real-tim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concurrency control on distributed objects using role ordering (RO) scheduler

    Publication Year: 2005, Page(s):66 - 73
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    A concept of role is significant to design and implement a secure information system. A role concept shows a job function in an enterprise. A role-based access control (RBAC) model is used to make a system secure. In addition to keeping systems secure, objects have to be consistent in presence of multiple transactions. Traditional locking protocols and timestamp ordering schedulers are based on pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic scheduling for multithreaded replicas

    Publication Year: 2005, Page(s):74 - 81
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    Replication of objects, processes and components is essential for building reliable distributed systems. However, maintaining replica consistency in the presence of nondeterminism is a challenge. There are many sources of nondeterminism in the applications being replicated. In this paper, we focus on the nondeterminism resulting from multithreading in the applications, and present a deterministic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the real-time behaviour of a multithreaded Java microcontroller by control theory and model based latency prediction

    Publication Year: 2005, Page(s):82 - 93
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1856 KB) | HTML iconHTML

    Our aim is to investigate if it is possible to control and to stabilize the throughput (IPC rate) of a thread running on a multithreaded Java processor by a closed feedback loop and a model based latency predictor. We implemented a PID controller and a model based latency predictor in the processor simulator of the Komodo microcontroller developed at the universities of Karlsruhe and Augsburg to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of the warfighting architecture requirements (WAR) tool

    Publication Year: 2005, Page(s):97 - 104
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    The warfighting architecture requirements (WAR) tool extends the Department of Defense Architectural Framework (DODAF) to fill warfighting voids. It builds warfighting scenarios and documents joint capabilities integration and development system (JCIDS) elements. WAR uses DoD task lists to build scenarios attributed by doctrine, organization, training, material, leadership, personnel and facilitie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JavaMaC and runtime monitoring for geoinformatics grid services

    Publication Year: 2005, Page(s):105 - 112
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    The Geoscience Network (GEON) project is a collaborative effort among numerous institutions to create the geoinformatics infrastructure. Because of the criticality of the grid services that is deployed, scientists need assurance of the integrity of the data supplied by the service and assurance that the workflows and other scientific applications behave as expected. This paper describes the effort... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error recovery for a boiler system with OTS PID controller

    Publication Year: 2005, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    We have previously presented initial results of a case study which illustrated an approach to engineering protective wrappers as a means of detecting errors or unwanted behaviour in systems employing an OTS (off-the-shelf) item. The case study used a Simulink model of a steam boiler system together with an OTS PID (proportional, integral and derivative) controller. The protective wrappers are deve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time data fusion technique for validation of an autonomous system

    Publication Year: 2005, Page(s):121 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB) | HTML iconHTML

    We describe a data fusion technique suitable for use in validation of a real-time autonomous system. The technique is based on the Dempster-Shafer theory and Murphy's rule for beliefs combination. The methodology is applied for fusing the learning stability estimates, provided by an online neural network monitoring methodology, into a single probabilistic learning stability measure. The case study... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed computing based streaming and play of music ensemble realized through TMO programming

    Publication Year: 2005, Page(s):129 - 136
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    We present a new class of multimedia applications where the exploitation of the principle of global-time-based coordination of distributed actions (TCoDA) is compelling. In these applications, multiple small-footprint PCs, each equipped with its own speakers, act as instrument players or singers forming an ensemble. Each player PC obtains its piece of the musical audio data over an Ethernet networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification-based verification and validation of Web services and service-oriented operating systems

    Publication Year: 2005, Page(s):139 - 147
    Cited by:  Papers (14)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    Service-oriented architecture (SOA) and Web services (WS) have received significant attention recently. Even though WS are based on open standards and support software interoperability, but the trustworthy issues of WS has actually limited the growth of WS applications as organizations do not trust those WS developed by other vendors and at the same time they do not have access to the source code.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of fault-tolerant distributed Web systems

    Publication Year: 2005, Page(s):148 - 151
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Replication of information among multiple servers is necessary to service requests for Web application such as Internet banking. A dispatcher in distributed Web systems distributes client requests among Web application servers and multiple dispatchers are also needed for fault-tolerant Web services. In this paper, we describe issues related to building fault-tolerant distributed Web systems. We ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.