Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Model verification of real-time and distributed stream processing architecture: Model verification of real-time and distributed...
AbstractReal-time data processing systems are required to manage large volumes of data and deliver instant feedback. These systems are typically constructed on distributed processing architectures, where addressing the challenges of preventing deadlocks, ...
- research-articleSeptember 2024
Contextual authentication of users and devices using machine learning
AbstractAt the time of authentication, confidential data are exchanged between the user/device and the authentication server to determine the legitimacy of the source requesting authentication. Safeguarding the authentication process from security attacks ...
- review-articleAugust 2024
A survey on the cold start latency approaches in serverless computing: an optimization-based perspective
AbstractServerless computing is one of the latest technologies that has received much attention from researchers and companies in recent years since it provides dynamic scalability and a clear economic model. Serverless computing enables users to pay only ...
- research-articleMay 2024
An association rule mining-oriented approach for prioritizing functional requirements
AbstractSoftware requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained development environment. To deal with this ...
- research-articleMay 2024
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems
AbstractThe smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services. The main idea of these healthcare systems is to provide data security, interaction between entities, ...
-
- research-articleMarch 2024
- research-articleAugust 2022
- research-articleJuly 2022
Continuous verification of system of systems with collaborative MAPE-K pattern and probability model slicing
Information and Software Technology (INST), Volume 147, Issue Chttps://doi.org/10.1016/j.infsof.2022.106904AbstractThe phenomenon of cooperation among independent systems to achieve common goals has been growing. In this regard, the concept of system of systems (SoS), wherein numerous independent systems cooperate with each other, has been proposed. The key ...
Highlights
- The proposed collaborative MAPE-K pattern enables knowledge sharing among systems.
- To address synchronization during slicing, we propose synchronization dependence
- To show knowledge sharing, we clarify the roles of components in ...
- research-articleJune 2021
A hierarchical formal method for performance evaluation of WSNs protocol
AbstractThe design and the evaluation of communication protocols in WSNs is a crucial issue. Generally, researchers use simulation methods to evaluate them. However, formal modelling and analysis techniques are an efficient alternative to simulation ...
- research-articleApril 2021
A conceptual framework for resilience: fundamental definitions, strategies and metrics
AbstractThe resilience system property has become more and more relevant, mainly because of the increasing dependance on a rapidly growing number of software-intensive, complex, socio-technical systems, which are facing uncertainty about changes they are ...
- research-articleAugust 2020
A family of software product lines in educational technologies
AbstractRapid advances in education domain demand the design and customization of educational technologies for a large scale and variety of evolving requirements. Here, scale is the number of systems to be developed and variety stems from a diversified ...
- research-articleJanuary 2020
Resource allocation based on redundancy models for high availability cloud
- Glauco Estácio Gonçalves,
- Patricia Takako Endo,
- Moises Rodrigues,
- Djamel H. Sadok,
- Judith Kelner,
- Calin Curescu
AbstractToday, most innovation on Information Technology and Communication is cloud-centric and an increasing number of organizations believe that this transition is ever more unavoidable. With this increased demand for Cloud services, providers are ...
- research-articleJuly 2019
A novel concurrent relational association rule mining approach
Expert Systems with Applications: An International Journal (EXWA), Volume 125, Issue CPages 142–156https://doi.org/10.1016/j.eswa.2019.01.082Highlights- We propose a novel approach to concurrent relational association rule mining.
- ...
Data mining techniques are intensively used to uncover relevant patterns in large volumes of complex data which are continuously extended with newly arrived data instances. Relational association rules (RARs), a data ...
- research-articleJanuary 2019
Extreme Scale FMM-Accelerated Boundary Integral Equation Solver for Wave Scattering
SIAM Journal on Scientific Computing (SISC), Volume 41, Issue 3Pages C245–C268https://doi.org/10.1137/18M1173599We present a boundary integral equation solver for wave scattering suited for many-core processors, which are expected to be the building blocks of energy-austere exascale systems, and on which algorithmic and architecture-oriented optimizations are essential ...
- articleJanuary 2019
A mechanized refinement proof of the Chase---Lev deque using a proof system
We present a linearizability proof for the concurrent Chase---Lev work-stealing queue (WSQ) implementation on sequentially consistent memory. We used the CIVL proof system to carry out the proof. The lowest-level description of the WSQ is the data ...
- articleNovember 2018
Finding correlations of features affecting energy consumption and performance of web servers using the HADAS eco-assistant
Computing (CMPT), Volume 100, Issue 11Pages 1155–1173The impact of energy consumption on the environment and the economy is raising awareness of "green" software engineering. HADAS is an eco-assistant that makes developers aware of the influence of their designs and implementations on the energy ...
- articleSeptember 2018
A program slicing-based method for effective detection of coincidentally correct test cases
Despite the proven applicability of the spectrum-based fault localization (SBFL) methods, their effectiveness may be degraded due to the presence of coincidental correctness, which occurs when faults fail to propagate, i.e., their execution does not ...
- articleSeptember 2018
Descending chains and narrowing on template abstract domains
A static analysis by abstract interpretation is typically composed of an ascending phase followed by a descending one. The descending phase is used to improve the precision of the analysis after that a post-fixpoint has been reached. Termination is ...
- articleJune 2018
Spatio-temporal model checking of vehicular movement in public transport systems
International Journal on Software Tools for Technology Transfer (STTT) (STTT), Volume 20, Issue 3Pages 289–311https://doi.org/10.1007/s10009-018-0483-8We present the use of a novel spatio-temporal model checker to detect problems in the data and operation of a collective adaptive system. Data correctness is important to ensure operational correctness in systems which adapt in response to data. We ...