By Topic

Dependable Computing (LADC), 2011 5th Latin-American Symposium on

Date 25-29 April 2011

Filter Results

Displaying Results 1 - 25 of 30
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (354 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2011, Page(s):vii - viii
    Request permission for commercial reuse | PDF file iconPDF (139 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Co-chairs

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (123 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committees

    Publication Year: 2011, Page(s):x - xii
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2011, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • GENESYS - A Cross-Domain Architecture for Dependable Embedded Systems

    Publication Year: 2011, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (311 KB) | HTML iconHTML

    Recognizing the strategic importance of embedded computing for industry and society, the European Commission formed, together with industry, academia, and national governments, the European technology platform ARTEMIS (Advanced Research and Technology for Embedded Intelligence and Systems) in 2004. It is one goal of ARTEMIS to develop a cross-domain embedded system architecture, supported by desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Byzantine Fault-Tolerant Deferred Update Replication

    Publication Year: 2011, Page(s):7 - 16
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (393 KB) | HTML iconHTML

    Replication is a well-established approach to increasing database availability. Many database replication protocols have been proposed for the crash-stop failure model, in which servers fail silently. Fewer database replication protocols have been proposed for the byzantine failure model, in which servers may fail arbitrarily. This paper considers deferred update replication, a popular database re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Snapshot Algorithm for Multicore Systems

    Publication Year: 2011, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    An atomic snapshot object is an object that can be concurrently accessed by n asynchronous processes prone to crash. It is made of m components (base atomic registers) and is defined by two operations: an update operation that allows a process to atomically assign a new value to a component and a snapshot operation that atomically reads and returns the values of all the components. To cope with th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Fault Tolerance of Distributed R-Tree

    Publication Year: 2011, Page(s):25 - 34
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    Distributed R-trees (DR-trees) are appealing infrastructures for implementing range queries, content based filtering or k-NN structures since they inherit the features of R-trees such as logarithmic height, bounded number of neighbors and balanced shape. However, they are crash-sensitivite since each single crash can potentially break the tree structure connectivity. In this article, we present a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Reliability and Availability of Systems Tolerant to Stealth Intrusion

    Publication Year: 2011, Page(s):35 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    This paper considers the estimation of reliability and availability of intrusion-tolerant systems subject to non-detectable intrusions. Our motivation comes from the observation that typical techniques of intrusion tolerance may in certain circumstances worsen the non-functional properties they were meant to improve (e.g., dependability). We start by modeling attacks as adversarial efforts capable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Attacks in Wireless Mesh Networks

    Publication Year: 2011, Page(s):45 - 54
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (489 KB) | HTML iconHTML

    Wireless Mesh Network (WMN) is a new technology that is gaining importance among traditional wireless communication systems. Wireless Mesh Networks are becoming a reasonable choice to offer Internet access in an inexpensive, convenient, and quick way. However, WMNs are vulnerable to several kinds of attacks because of their inherent attributes such as the open communication medium. Malicious mesh ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Benchmarking the Security of Web Serving Systems Based on Known Vulnerabilities

    Publication Year: 2011, Page(s):55 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    This paper proposes a methodology and a tool to evaluate the security risk presented when using software components or systems. The risk is estimated based on known vulnerabilities existing on the software components. An automated tool is used to extract and aggregate information on vulnerabilities reported by users and available on public databases (e.g., OSVDB and NVD). This tool generates compr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-Aware Test Connection Assignment for the Diagnosis of a Wireless Sensor Network

    Publication Year: 2011, Page(s):65 - 73
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB) | HTML iconHTML

    In a Wireless Sensor Network (WSN) where the sensors raise alarms in response to anomalous events, we consider the problem of detecting false alarms (i.e. false positives) by using a system-level diagnosis approach. In particular, we assume that a set of t sensors in a geographic neighborhood generate the alarm, and the sink issues to the WSN a self test task that involves a number of reciprocal t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource Optimization and Energy Saving in Clusters Using Virtualization

    Publication Year: 2011, Page(s):74 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (474 KB) | HTML iconHTML

    This work proposes a reusable architecture that enables the management of a supporting infrastructure for Web server clusters using virtual machines. The goal of the architecture is to ensure service quality, evaluating how broadly it complies with the operating restrictions (maximum response time) and proportionally acting on physical servers (hosts) or manipulating the virtual machines. In addit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exception Handling for Service Component Architectures

    Publication Year: 2011, Page(s):84 - 93
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    The Service Component Architecture (SCA) makes it possible to combine existing and new services based on a variety of technologies with components built using a component-based development approach. However, when asynchronous services compositions are executed, one or more errors can occur, possibly at the same time, affecting the composition's dependability. In many cases, parts of the compositio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Selecting Representative Faultloads to Guide the Evaluation of Ad Hoc Networks

    Publication Year: 2011, Page(s):94 - 99
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    Ad hoc networks are threatened by a wide variety of accidental and malicious faults. This fact limits the practical exploitation of ad hoc networks. In consequence, apart from enforcing the dependability and security aspects of these networks, the provision of approaches to evaluate their behaviour in the presence of faults and attacks is of paramount importance. Accordingly, analysing and determi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Collecting, Analyzing and Archiving Results from Fault Injection Experiments

    Publication Year: 2011, Page(s):100 - 105
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    This paper addresses the issue of the identification of the suitable level of observation (readouts and measurements) to characterize fault injection experiments. In practice, several outcomes can be observed in an experiment, but it is not rare for experimenters to consider only one viewpoint or to rely on the first event observed, in order to diagnose the experiment. In addition, there is not al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • J-SWFIT: A Java Software Fault Injection Tool

    Publication Year: 2011, Page(s):106 - 115
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1099 KB) | HTML iconHTML

    Software faults are known as a major cause of computational systems' defects. Even when these systems are tested exhaustively they can present some failures due to the activation of residual software faults in the source code. Software fault injection tools are useful to emulate the presence of software faults and to monitor the system allowing one to observe if the system continues to operate as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RACME: A Framework to Support V&V and Certification

    Publication Year: 2011, Page(s):116 - 125
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1038 KB) | HTML iconHTML

    Verification and Validation (V&V) processes are largely applied to critical systems, and often imposed by certification needs. Many V&V processes are defined in the state of the art, for different kind of systems and different kinds of dependability requirements. A very large set of techniques and tools have been developed to execute specific tasks within these V&V processes. However, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture-Based Criticality Assessment of Software Systems

    Publication Year: 2011, Page(s):126 - 135
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    The development of dependable software systems with acceptable costs and time often requires architectural analyses and criticality assessment strategies to achieve a detailed understanding of the system failing behavior. This information is valuable to evaluate architectural alternatives, to allocate resources, such as, testing efforts and fault tolerance means, efficiently, and to support the se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Validation of Exception Handling in the Development of Dependable Component-Based Software Systems

    Publication Year: 2011, Page(s):136 - 145
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1699 KB) | HTML iconHTML

    The use of exception handling mechanisms to develop robust software in a non-systematic manner can be a source of many design faults. This paper presents an approach that allows to systematize the validation of the system's exceptional behavior at both the software architecture and detailed design levels. At the software architecture, our solution is based on the specification and verification of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.