25-28 June 2012
Filter Results
-
Jean-Claude Laprie award in dependable computing
Publication Year: 2012, Page(s): 1|
PDF (154 KB)
-
Message from the DCCS program chair
Publication Year: 2012, Page(s): 1|
PDF (77 KB)
-
Organizers DSN 2012
Publication Year: 2012, Page(s):1 - 5|
PDF (77 KB)
-
Message from the PDS program chair
Publication Year: 2012, Page(s): 1|
PDF (73 KB)
-
Sponsors
Publication Year: 2012, Page(s): 1|
PDF (129 KB)
-
William C. Carter Award
Publication Year: 2012, Page(s): 1|
PDF (98 KB)
-
Message from the general chair
Publication Year: 2012, Page(s): 1|
PDF (65 KB)
-
WORCS committees
Publication Year: 2012, Page(s):1 - 2|
PDF (138 KB)
-
Workshop on open resilient human-aware Cyber-physical systems
Publication Year: 2012, Page(s):1 - 2Cyber-physical systems are tight integrations of computation, networking, and physical objects. Advances recently witnessed in pervasive and ubiquitous information processing, driven by major breakthroughs in cyber-physical technology are paving the way towards a more hospitable and sustainable future via a more efficient management of our environment: homes, work places, open areas, etc. Examples... View full abstract»
-
Invited talk: Challenges in Medical Cyber-Physical Systems
Publication Year: 2012, Page(s): 1Summary form only given. As computers and communication bandwidth become ever faster and cheaper, computing and communication capabilities are embedded in all types of objects and structures in the physical environment. Harnessing these capabilities to bridge the cyber-world with the physical world will allow the development of applications with great societal impact and economic benefit. At the h... View full abstract»
-
Invited talk: Virtual coaches in health care
Publication Year: 2012, Page(s): 1Summary form only given. With health care costs raising astronomically and the number of aging increasing, there are not enough economic or human resources in the way of care givers to meet society's needs. A confluence of technologies including miniature electronics, digital communications, human-computer interaction, robotics, and machine learning makes possible the creation of intelligent assis... View full abstract»
-
Invited talk: A model and simulation for user-centric automation devices and systems
Publication Year: 2012, Page(s): 1Summary form only given. This talk will present an environment and an executable model that support simulation of user-centric automation devices and systems (UCADS), human users and user-device interactions. The underlying UCADS combines workflow and GOMS model elements. The combination makes it possible to leverage GOMS interface evaluation techniques in experimentation with deviceuser interacti... View full abstract»
-
Smart checklists for human-intensive medical systems
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (7)Human-intensive cyber-physical systems involve software applications and hardware devices, but also depend upon the expertise of human participants to achieve their goal. In this paper. we describe a project we have started to improve the effectiveness of such systems by providing Smart Checklists to support and guide human participants in carrying out their tasks, including their interactions wit... View full abstract»
-
Towards resiliency in embedded medical monitoring devices
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (2)Safety-critical medical monitoring systems have always suffered from false alarms and misdetection issues, sensitivity to external perturbations and internal faults, which could be catastrophic for patients. We address the main challenges faced towards the resiliency of medical monitoring devices by introducing a novel reconfigurable hardware architecture that enables: (i) accurate detection of me... View full abstract»
-
A rigorous approach to the design of resilient cyber-physical systems through co-simulation
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (1)The engineering of resilient cyber-physical systems requires collaborative development and analysis of models from different disciplines, including discrete-event models of software and continuous-time models of physical plant. This paper describes a rigorous approach to the model-based design of such systems through co-simulation of discrete-event models in the Vienna Development Method (VDM) and... View full abstract»
-
Physical attack protection with human-secure virtualization in data centers
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (1)Cloud computing-based data centers, which hold a large amount of customer data, are vulnerable to physical attacks and insider threats. Current protection and defense mechanisms for security of data held in data centers are either completely physical (sensors, barriers, etc.) or completely cyber (firewalls, encryption, etc.). In this paper we propose a novel cyber-physical security defense for clo... View full abstract»
-
MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (6) | Patents (2)Electronic architectures in the aerospace domain get more and more integrated and interconnected due to functional and architectural reasons. Such a tight integration raises the need to control information flows between different security domains on-board and off-board aircraft. This paper presents and discusses the specification and implementation of a software architecture of a security gateway ... View full abstract»
-
Panel: Challenges and research directions in resilient cyber-physical systems
Publication Year: 2012, Page(s): 1This panel is aimed at discussing the main challenges raised during the development and operation of cyber-physical systems that have to fulfill stringent dependability and security requirements, considering various application domains where physical devices interact with human-users. The discussion will also address current solutions and future research directions to cope with these challenges. View full abstract»
-
Chaotic-identity maps for robustness estimation of exascale computations
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (1)Exascale computing systems are expected to consist of millions of components, and the current engineering and manufacturing practices cannot guarantee their complete fault-free operation during the code executions lasting several hours. Consequently, the outputs of computations executed on them must be quantified with confidence estimates that reflect their failure-free execution. We propose (i) l... View full abstract»
-
Asynchronous checkpoint migration with MRNet in the Scalable Checkpoint / Restart Library
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (2)Applications running on today's supercomputers tolerate failures by periodically saving their state in checkpoint files on stable storage, such as a parallel file system. Although this approach is simple, the overhead of writing the checkpoints can be prohibitive, especially for large-scale jobs. In this paper, we present initial results of an enhancement to our Scalable Checkpoint / Restart Libra... View full abstract»
-
Does partial replication pay off?
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (9)As part counts in high performance computing systems are projected to increase faster than part reliabilities, there is increasing interest in enabling jobs to continue to execute in the presence of failures. Process replication has been shown to be a viable method to accomplish this, but previous studies have focussed on full replication levels (dual, triple, etc). In this work, we present a mode... View full abstract»
-
Energy considerations in checkpointing and fault tolerance protocols
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (12)Exascale supercomputers will gather hundreds millions cores. The first problem that we address is resiliency and fault tolerance to reach application termination on such platforms. The second problem is energy consumption since such systems will consume enormous amount of energy. In this paper, we evaluate checkpointing and existing fault tolerance protocols from an energy point of view. We measur... View full abstract»
-
A programming model for resilience in extreme scale computing
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (6)System resilience is an important challenge that needs to be addressed in the era of extreme scale computing. Exascale supercomputers will be architected using millions of processor cores and memory modules. As process technology scales, the reliability of such systems will be challenged by the inherent unreliability of individual components due to extremely small transistor geometries, variabilit... View full abstract»
-
ROSE::FTTransform - A source-to-source translation framework for exascale fault-tolerance research
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (9)Exascale computing systems will require sufficient resilience to tolerate numerous types of hardware faults while still assuring correct program execution. Such extreme-scale machines are expected to be dominated by processors driven at lower voltages (near the minimum 0.5 volts for current transistors). At these voltage levels, the rate of transient errors increases dramatically due to the sensit... View full abstract»
-
A message-logging protocol for multicore systems
Publication Year: 2012, Page(s):1 - 6
Cited by: Papers (8)Although many details of an eventual Exascale machine remain unknown, we can safely make a couple of assumptions. Exascale machines will be composed of multicore nodes and will experience frequent failures. The latter means that effective resilience support is imperative to make Exascale machines usable. The former opens up opportunities for exploring new alternatives to provide resilience support... View full abstract»