Proceedings of the Eighth International Workshop on Object-Oriented Real-Time Dependable Systems, 2003. (WORDS 2003).

17-17 Jan. 2003

Filter Results

Displaying Results 1 - 25 of 42
  • Eighth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems

    Publication Year: 2003
    Request permission for commercial reuse | |PDF file iconPDF (381 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2003, Page(s):319 - 320
    Request permission for commercial reuse | |PDF file iconPDF (177 KB)
    Freely Available from IEEE
  • Event-driven support of real-time sentient objects

    Publication Year: 2003, Page(s):2 - 9
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (499 KB) | HTML iconHTML

    The emergence of applications operating independently of direct human control is inevitable. Research on high-level models for this class of applications - e.g. on autonomous agents and distributed AI - has revealed the shortcomings of current architectures and middleware interaction paradigms. If we focus on complex real-time systems made of embedded components, that evidence is even more strikin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A word for operational flexibility in distributed safety-critical systems

    Publication Year: 2003, Page(s):177 - 184
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (286 KB) | HTML iconHTML

    Safety-critical systems have typically been designed in a static fashion, preventing runtime changes in the operational parameters that could possibly lead to unpredictable and unsafe operating scenarios. However, there is a growing demand for flexibility, mainly to support evolving requirements, simplify maintenance and repair, and improve the efficiency in using system resources. This last aspec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Timing analysis of optimized code

    Publication Year: 2003, Page(s):100 - 105
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (585 KB) | HTML iconHTML

    Timing analysis is a crucial test for dependable hard real-time systems (DHRTS). The calculation of the worst-case execution time (WCET) is mandatory. As modern compilers are able to produce small and efficient code, software development for DHRTS is mostly done in high-level languages instead of assembly code. Execution path information available at source code (flow facts) therefore has to be tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving dependability of service oriented architectures for pervasive computing

    Publication Year: 2003, Page(s):74 - 81
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (317 KB) | HTML iconHTML

    Service oriented programming - which combines distributed object computing, component-based and Web-based concepts - has recently emerged as a promising approach to develop dynamic and heterogeneous service provision environments. Such systems are referenced in literature as service oriented architectures. Classic strategies to address dependability in distributed object computing middleware may n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ORB middleware evolution for networked embedded systems

    Publication Year: 2003, Page(s):169 - 176
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (286 KB) | HTML iconHTML

    Standards-based COTS (common-off-the-shelf) middleware has been shown to be effective in meeting a range of functional and QoS (quality of service) requirements for distributed real-time and embedded (DRE) systems. Each standard makes limiting assumptions, often implicit, about the fundamental set of system capabilities and constraints typical of the domain to which the standard applies. When the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using co-ordinated atomic actions for building complex Web applications: a learning experience

    Publication Year: 2003, Page(s):288 - 295
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (318 KB) | HTML iconHTML

    This paper discusses some of the typical characteristics of modern Web applications and analyses some of the problems the developers of such systems have to face. One of such types of applications is integrated Web application, i.e. application that integrates several independent Web services. The paper focuses on providing software fault tolerance for such systems. The solution we put forward emp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Starfish system: providing intrusion detection and intrusion tolerance for middleware systems

    Publication Year: 2003, Page(s):191 - 199
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (2279 KB) | HTML iconHTML

    We introduce the Starfish system, a new system that provides intrusion detection and intrusion tolerance for middleware applications operating in an asynchronous distributed system. The Starfish system contains a central, highly secure and tightly coupled core. This core is augmented by "arms" that are less tightly coupled and that have less stringent security guarantees, each of which can be remo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Search-based execution-time verification in object-oriented and component-based real-time system development

    Publication Year: 2003, Page(s):113 - 120
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (313 KB) | HTML iconHTML

    Execution time analysis is an essential verification activity during real-time system construction. This activity can be performed dynamically through search-based analysis techniques such as evolutionary algorithms. Evolutionary algorithms have already been successfully used for execution-time analysis under the traditional procedural development paradigm. This paper describes a first attempt in ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query plans with roaming sources: shifting streams of data

    Publication Year: 2003, Page(s):90 - 97
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (309 KB) | HTML iconHTML

    Wireless embedded systems provide an opportunity for the collection of useful data from a wide range of mobile devices. However, such devices may often have strict limits on their functionality, processing power, battery life, and wireless bandwidth. We present a method for distributing mobile query operators to enhance performance in a system consisting of many such mobile devices while supportin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self*: a data-flow oriented component framework for pervasive dependability

    Publication Year: 2003, Page(s):66 - 73
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (300 KB) | HTML iconHTML

    Both the scale and the reach of computer systems and embedded devices have been expanding constantly over the last few decades. As computer systems become pervasive, their criticality increases because they become an even more integral part of the infrastructure upon which our society depends. Hence, pervasive systems are likely to become "society critical" and their dependable operation must be e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliable Compare&Swap for fault-tolerant synchronization

    Publication Year: 2003, Page(s):50 - 55
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (343 KB) | HTML iconHTML

    This paper presents two Compare&Swap protocols that, with respect to omission failures, are (1) fault-tolerant and (2) gracefully degrading, respectively. It shows that fault-tolerance and graceful degradation are close but distinct concepts, and that graceful degradation is inherently more costly than fault-tolerance. These Compare&Swap protocols are derived from consensus protocols proposed by J... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Object and process migration in .NET

    Publication Year: 2003, Page(s):139 - 146
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (409 KB) | HTML iconHTML

    Most of today's distributed computing systems in the field do not support the migration of execution entities among computing nodes during runtime. The relatively static association between units of processing and computing nodes makes it difficult to implement fault-tolerant behavior or load-balancing schemes. The concept of code migration may provide a solution to the problems mentioned above. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architectural solutions for enhancing the real-time behavior of distributed embedded systems

    Publication Year: 2003, Page(s):164 - 168
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (326 KB) | HTML iconHTML

    The paper presents a low cost embedded hardware and software architecture that makes use of COTS components to support distributed real-time embedded systems. The proposed architecture addresses a common problem in conventional architectures: undesirable timing variations in application's temporal behavior due to overload caused by operating system activities when dealing with concurrent and time-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An optimal atomic broadcast protocol and an implementation framework

    Publication Year: 2003, Page(s):32 - 39
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (382 KB) | HTML iconHTML

    Atomic broadcast (where all processes deliver broadcast messages in the same order) is a very useful group communication primitive for building fault-tolerant distributed systems. This paper presents an atomic broadcast protocol that can be claimed to be optimal in terms of failure detection, resilience, and latency. The protocol requires only the weakest of the useful failure detectors for livene... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compliant control and software agents for Internet robotics

    Publication Year: 2003, Page(s):280 - 287
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (348 KB) | HTML iconHTML

    This paper describes the architectural principles of a distributed agent-based platform for the remote supervision of robotic manipulation tasks. The main contributions are that real-time constraints can be encapsulated within the local robotic controller through methods of compliant control, and that such a low-level API (application program interface) is the foundation for distributed applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Infrastructure for virtual enterprises in large-scale open systems

    Publication Year: 2003, Page(s):242 - 249
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (385 KB) | HTML iconHTML

    This paper presents SALE, a middleware platform for mission-critical applications built upon the CORBA architecture and its extensions for real-time (RT-CORBA), fault tolerance (FT-CORBA) and security (CORBASec). The SALE platform provides different reliability, security and real-time properties, which are specified by applications as quality of service (QoS) requirements. Preliminary results obta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operating system supports to enhance fault tolerance of real-time systems

    Publication Year: 2003, Page(s):10 - 17
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (631 KB) | HTML iconHTML

    The virtual memory functions in real-time operating systems have been used in real-time systems. The virtual memory functions of real-time operating systems enhance the fault-tolerance of real-time systems because their memory protection mechanism isolates faulty real-time tasks. Recent RISC processors provide virtual memory support through software-managed translation lookaside buffer (TLB) in so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and middleware

    Publication Year: 2003, Page(s):186 - 190
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (254 KB) | HTML iconHTML

    The security features of current middleware platforms, like Enterprise Java Beans and CORBA (Common Object Request Broker Architecture), are either simple and limited or complex and difficult to use. In both cases are the provided features static and do not support the flexibility needed in a wide range of applications. This paper introduces and approach to flexible security mechanisms in the cont... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A tool for automatic flow analysis of C-programs for WCET calculation

    Publication Year: 2003, Page(s):106 - 112
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (293 KB) | HTML iconHTML

    Bounding the worst case execution time (WCET) of programs is essential for real-time systems. To be able to do WCET calculations, the iteration bounds for loops and recursion must be known. We describe a prototype tool that calculates these bounds automatically, thereby avoiding the need for manual annotations by the programmer. The analysis is based on an intermediate code representation, which m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software infrastructure for building large-scaled smart environments

    Publication Year: 2003, Page(s):82 - 89
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (575 KB) | HTML iconHTML

    This paper presents our ongoing project to develop software infrastructure for building large-scaled smart environments. In the future, embedding computers in our daily artefacts will augment our lives. However, without proper software infrastructure, it is very difficult to implement applications programs or the environments. Our software infrastructure provides a framework to build applications ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges in building scalable network centric real-time information dissemination systems

    Publication Year: 2003, Page(s):296 - 301
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (304 KB) | HTML iconHTML

    As the DoD strives for a new Network Centric Warfare (NCW) (Alberts et al., http://www.dodccrp.org) capability, a multitude of technical and organizational challenges are being faced. In large part, NCW can be classified as a collective large-scale information dissemination system that operates at multitudes of levels and will be implemented using different distributed technologies and architectur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mirror hopping approach for selective denial of service prevention

    Publication Year: 2003, Page(s):200 - 208
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (344 KB) | HTML iconHTML

    This paper focuses on a category of denial of service (DoS) attacks, a growing concern in the information security arena, namely the selective DoS (S-DoS). We propose an S-DoS prevention approach by extending the well-known mirror sites idea by redirecting different access requests from the same user to different mirror sites. We develop an HTTP (hypertext transfer protocol) parser that fragments ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Portal replication for Web application availability via SOAP

    Publication Year: 2003, Page(s):122 - 130
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (322 KB) | HTML iconHTML

    The interoperability of SOAP (Simple Access Object Protocol) has eased the provision of B2B (business to business) solutions where Web applications (Web form submission via browser) are only suitable for supporting B2C (business to client). As many services exist that are delivered to clients via Web applications, enabling the delivery of such services via SOAP to provide B2B solutions is desirabl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.