By Topic

Future Dependable Distributed Systems, 2009 Software Technologies for

Date 17-17 March 2009

Filter Results

Displaying Results 1 - 25 of 53
  • [Front cover]

    Publication Year: 2009, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2009, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2009, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2009, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (155 KB)
    Freely Available from IEEE
  • Message from the Workshop Co-Chairs

    Publication Year: 2009, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee Lists

    Publication Year: 2009, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Towards Composable Timing for Real-Time Programs

    Publication Year: 2009, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (153 KB) | HTML iconHTML

    Real-time software is increasing in size and complexity, precipitating the need for advanced modeling and analysis capabilities early in the software development process. One particular concern is the lack of sufficient methods and tools to effectively reason about the timing of software in such a way that software systems can be constructed hierarchically from components while still guaranteeing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Software for Modular Static Average-case Analysis

    Publication Year: 2009, Page(s):6 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    MOQA is a new domain-specific programming language to design software for which the average-case time analysis of its programs is guaranteed to be modular. Time in this context refers to a broad notion of cost, which can be used to estimate the actual running time, but also other quantitative information such as power consumption, while modularity means that the average time of a program can be ea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-predictable Cache Organization

    Publication Year: 2009, Page(s):11 - 16
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (162 KB) | HTML iconHTML

    Caches are a mandatory feature of current processors to deliver instructions and data to a fast processor pipeline. However, standard cache organizations are designed to increase the average case performance. They are hard to model for worst-case execution time (WCET) analysis. Unknown abstract cache states during the analysis result in conservative WCET bounds. Therefore, we propose to adapt the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Equivalence Partitioning of Code Paths inside OS Kernel Components

    Publication Year: 2009, Page(s):17 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    Commercial-off-the-shelf operating systems (COTS OSs) are increasingly chosen as key building blocks in embedded system design due to their rich feature-set available at low costs. Unfortunately, as the complexity of such OSs increases, testing key OS components such as device drivers (DD) to ensure continuous service provision becomes increasingly challenging. Despite the improving test efforts t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Secure Resource Utilization in FPGAs with Partial Runtime Reconfiguration

    Publication Year: 2009, Page(s):20 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    This paper describes the role of security policies for FPGAs. The FPGA development specifics and a short overview of threats against systems security are presented. We propose a security policy consisting of three parts, first: addressing the general security demands, second: the communication between FPGA and the peripheral devices, and third: the behaviour inside the FPGA. The different methods ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability and Robustness: State of the Art and Challenges

    Publication Year: 2009, Page(s):25 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (174 KB) | HTML iconHTML

    Dependability is a broad concept which covers such aspects of computer systems like reliability, maintainability, and availability. Also because of this broadness, researches came up with related yet more focused notions such as self-healing and robustness. In this article, I discuss robustness in relation to dependability and make a distinction between these two. I outline the state of the art of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Scalable Monitoring System for Distributed Environments

    Publication Year: 2009, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (851 KB) | HTML iconHTML

    This paper introduced a monitoring architecture that is highly scalable and suitable for practical use in distributed environments. We also introduced two applications as illustrative embodiments of our concept and monitoring system. For better scalability and practicality, we are planning further developments on both monitoring system itself and applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly Detection System Using Resource Pattern Learning

    Publication Year: 2009, Page(s):38 - 42
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    In this paper, Anomaly Detection by Resource Monitoring (Ayaka), a novel lightweight anomaly and fault detection infrastructure, is presented for Information Appliances. Ayaka provides a general monitoring method for detecting anomalies using only resource usage information on systems independent of its domain, target application and programming languages. Ayaka modifies the kernel to detect fault... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profiling Node Conditions of Distributed System with Sequential Pattern Mining

    Publication Year: 2009, Page(s):43 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (959 KB) | HTML iconHTML

    Recently, with wide-spread of distributed systems, distributed monitoring systems are needed to mange such systems. However, since monitoring architecture of distributed system faces a huge amount of log data which come from local computing nodes, information aggregation is fundamental scheme for monitoring distributed system. In this paper, we preset a novel approach for extracting computing node... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Challenge of Eliminating Storage Bottlenecks in Distributed Systems

    Publication Year: 2009, Page(s):49 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    One of the most difficult problems in distributed systems is load-balancing. Even if we take care of load-balancing, heavily-loaded nodes often occur while there are still lightly-loaded nodes that have idle memory and idle CPU power. Our idea is to exploit this idle memory and idle CPU power to improve the storage performance of heavily-loaded nodes. Idle memory can be used for caching file data ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Alarm Annunciatior for Domain Administrators

    Publication Year: 2009, Page(s):54 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    Security market has been expanding steadily as people become more conscious about personal information management. On the other hand, administrators are competing with the flood of logs every day, and chasing for the updates on a new kind of attacks. Given the overwhelming tasks of administrators, it is extremely hard to keep the peace without the help of professionals such as hired system adminis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ECOISLAND: A System for Persuading Users to Reduce CO2 Emissions

    Publication Year: 2009, Page(s):59 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1483 KB) | HTML iconHTML

    A significant portion of the carbon dioxide emissions that have been shown to cause global warming are due to household energy consumption and traffic. EcoIsland is a computer system aimed at persuading and assisting individual families in changing their lifestyle patterns in a way that reduces CO2 emissions. The system builds on our earlier work on persuasive ubiquitous computing appli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incorporation of Security Mechanisms into the TMO Scheme for Real Time Distributed Computing

    Publication Year: 2009, Page(s):64 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Many real-time distributed computing (RTDC) applications have stringent action timing requirements as well as tight security-enforcement requirements. Integration of security enforcement mechanisms into advanced component-based RTDC schemes has been recognized as an important research topic in recent years. In this paper we propose the first formal extension of the Time-triggered Message-triggered... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-Commerce with Rich Clients and Flexible Transactions

    Publication Year: 2009, Page(s):73 - 77
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    In this paper we describe an approach for implementing a shopping cart program using rich clients. We assume our client is not always connected to the server side during a purchase. We utilize the well known approach known as flexible transactions to afford a best effort approach to successfully complete a purchase order. Our approach is timely as commercial solutions for rich client technology (s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Service-Oriented Self-Configurable Middleware for Autonomous Sensor Networks

    Publication Year: 2009, Page(s):78 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (985 KB) | HTML iconHTML

    This paper describes a service-oriented self-configurable middleware architecture to support autonomous sensor networks. Scheduling and load balancing that is integrated in our proposed service-oriented middleware achieve self-configuration. If an error occurred in a self-configurable network it is able to overcome it by different services, that makes the network more reliable and stable. In the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extended Static Analysis for Estimating WCET in Distributed Real Time Systems

    Publication Year: 2009, Page(s):83 - 87
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    In most distributed real-time systems, it is required to estimate the worst-case execution time (WCET) of a program. It is important to consider timing effects of the kernel service time and I/O operations in order to improve the accuracy of WCET. In this work, we attempt to extend the conventional static analysis of source programs for calculating WCET by adding the timing effects of queue wait t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Real-time Routing System for Vehicular Ad Hoc Networks

    Publication Year: 2009, Page(s):88 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (293 KB) | HTML iconHTML

    Vehicular Ad Hoc Networks (VANET) are emerging as one of the promising technologies for the future. It can be a specific case of real-time distributed systems. Ad hoc routing can be applied to vehicle-to-vehicle (V2V) communications, but some important points should be considered. Main issue in VANET is its high mobility. Once built routing path can be out of order very quickly and needs to be rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Data Dissemination in Overlays

    Publication Year: 2009, Page(s):93 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    In this paper we propose adaptive data dissemination algorithms for intelligently routing search queries in a peer-to-peer network. In our mechanism nodes build content synopses of their data and adaptively disseminate them to the most appropriate nodes. Based on the content synopses, a routing mechanism is being built to forward the queries to those nodes that have a high probability of providing... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.