By Topic

IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012)

Date 25-28 June 2012

Filter Results

Displaying Results 1 - 25 of 50
  • Jean-Claude Laprie award in dependable computing

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • Message from the DCCS program chair

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Organizers DSN 2012

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (77 KB)
    Freely Available from IEEE
  • Message from the PDS program chair

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • William C. Carter Award

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Message from the general chair

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • WORCS committees

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (138 KB)
    Freely Available from IEEE
  • Workshop on open resilient human-aware Cyber-physical systems

    Publication Year: 2012, Page(s):1 - 2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (118 KB) | HTML iconHTML

    Cyber-physical systems are tight integrations of computation, networking, and physical objects. Advances recently witnessed in pervasive and ubiquitous information processing, driven by major breakthroughs in cyber-physical technology are paving the way towards a more hospitable and sustainable future via a more efficient management of our environment: homes, work places, open areas, etc. Examples... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited talk: Challenges in Medical Cyber-Physical Systems

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB) | HTML iconHTML

    Summary form only given. As computers and communication bandwidth become ever faster and cheaper, computing and communication capabilities are embedded in all types of objects and structures in the physical environment. Harnessing these capabilities to bridge the cyber-world with the physical world will allow the development of applications with great societal impact and economic benefit. At the h... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited talk: Virtual coaches in health care

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (68 KB) | HTML iconHTML

    Summary form only given. With health care costs raising astronomically and the number of aging increasing, there are not enough economic or human resources in the way of care givers to meet society's needs. A confluence of technologies including miniature electronics, digital communications, human-computer interaction, robotics, and machine learning makes possible the creation of intelligent assis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Invited talk: A model and simulation for user-centric automation devices and systems

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (67 KB) | HTML iconHTML

    Summary form only given. This talk will present an environment and an executable model that support simulation of user-centric automation devices and systems (UCADS), human users and user-device interactions. The underlying UCADS combines workflow and GOMS model elements. The combination makes it possible to leverage GOMS interface evaluation techniques in experimentation with deviceuser interacti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart checklists for human-intensive medical systems

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Human-intensive cyber-physical systems involve software applications and hardware devices, but also depend upon the expertise of human participants to achieve their goal. In this paper. we describe a project we have started to improve the effectiveness of such systems by providing Smart Checklists to support and guide human participants in carrying out their tasks, including their interactions wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards resiliency in embedded medical monitoring devices

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1788 KB) | HTML iconHTML

    Safety-critical medical monitoring systems have always suffered from false alarms and misdetection issues, sensitivity to external perturbations and internal faults, which could be catastrophic for patients. We address the main challenges faced towards the resiliency of medical monitoring devices by introducing a novel reconfigurable hardware architecture that enables: (i) accurate detection of me... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A rigorous approach to the design of resilient cyber-physical systems through co-simulation

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1513 KB) | HTML iconHTML

    The engineering of resilient cyber-physical systems requires collaborative development and analysis of models from different disciplines, including discrete-event models of software and continuous-time models of physical plant. This paper describes a rigorous approach to the model-based design of such systems through co-simulation of discrete-event models in the Vienna Development Method (VDM) and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Physical attack protection with human-secure virtualization in data centers

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (526 KB) | HTML iconHTML

    Cloud computing-based data centers, which hold a large amount of customer data, are vulnerable to physical attacks and insider threats. Current protection and defense mechanisms for security of data held in data centers are either completely physical (sensors, barriers, etc.) or completely cyber (firewalls, encryption, etc.). In this paper we propose a novel cyber-physical security defense for clo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    Electronic architectures in the aerospace domain get more and more integrated and interconnected due to functional and architectural reasons. Such a tight integration raises the need to control information flows between different security domains on-board and off-board aircraft. This paper presents and discusses the specification and implementation of a software architecture of a security gateway ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel: Challenges and research directions in resilient cyber-physical systems

    Publication Year: 2012, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    This panel is aimed at discussing the main challenges raised during the development and operation of cyber-physical systems that have to fulfill stringent dependability and security requirements, considering various application domains where physical devices interact with human-users. The discussion will also address current solutions and future research directions to cope with these challenges. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic-identity maps for robustness estimation of exascale computations

    Publication Year: 2012, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1215 KB) | HTML iconHTML

    Exascale computing systems are expected to consist of millions of components, and the current engineering and manufacturing practices cannot guarantee their complete fault-free operation during the code executions lasting several hours. Consequently, the outputs of computations executed on them must be quantified with confidence estimates that reflect their failure-free execution. We propose (i) l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Asynchronous checkpoint migration with MRNet in the Scalable Checkpoint / Restart Library

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    Applications running on today's supercomputers tolerate failures by periodically saving their state in checkpoint files on stable storage, such as a parallel file system. Although this approach is simple, the overhead of writing the checkpoints can be prohibitive, especially for large-scale jobs. In this paper, we present initial results of an enhancement to our Scalable Checkpoint / Restart Libra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does partial replication pay off?

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    As part counts in high performance computing systems are projected to increase faster than part reliabilities, there is increasing interest in enabling jobs to continue to execute in the presence of failures. Process replication has been shown to be a viable method to accomplish this, but previous studies have focussed on full replication levels (dual, triple, etc). In this work, we present a mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy considerations in checkpointing and fault tolerance protocols

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1267 KB) | HTML iconHTML

    Exascale supercomputers will gather hundreds millions cores. The first problem that we address is resiliency and fault tolerance to reach application termination on such platforms. The second problem is energy consumption since such systems will consume enormous amount of energy. In this paper, we evaluate checkpointing and existing fault tolerance protocols from an energy point of view. We measur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A programming model for resilience in extreme scale computing

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    System resilience is an important challenge that needs to be addressed in the era of extreme scale computing. Exascale supercomputers will be architected using millions of processor cores and memory modules. As process technology scales, the reliability of such systems will be challenged by the inherent unreliability of individual components due to extremely small transistor geometries, variabilit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ROSE::FTTransform - A source-to-source translation framework for exascale fault-tolerance research

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB) | HTML iconHTML

    Exascale computing systems will require sufficient resilience to tolerate numerous types of hardware faults while still assuring correct program execution. Such extreme-scale machines are expected to be dominated by processors driven at lower voltages (near the minimum 0.5 volts for current transistors). At these voltage levels, the rate of transient errors increases dramatically due to the sensit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.