Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
A Hierarchical Adaptive Leader Election Algorithm for Crash-Recovery Distributed Systems
LADC '24: Proceedings of the 13th Latin-American Symposium on Dependable and Secure ComputingPages 136–145https://doi.org/10.1145/3697090.3697102Leader election is one of the basic building blocks of distributed systems. Multiple different distributed applications employ a leader for decision making or as a coordinator. Traditional leader election algorithms are usually based on all-to-all ...
- research-articleOctober 2024
Temporal isolation assessment in virtualized safety-critical mixed-criticality systems: A case study on Xen hypervisor
Journal of Systems and Software (JSSO), Volume 216, Issue Chttps://doi.org/10.1016/j.jss.2024.112147AbstractToday, we are witnessing the increasing use of the cloud and virtualization technologies, which are a prominent way for the industry to develop mixed-criticality systems (MCSs) and reduce SWaP-C factors (size, weight, power, and cost) by flexibly ...
Highlights- Proposed novel approach using DoE to assess temporal isolation in Virtualized MCSs.
- Identified knobs for testing Xen hypervisor in a realistic railway use case.
- Demonstrated effectiveness of the approach in mitigating timing ...
- research-articleJuly 2024
A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks
Wireless Personal Communications: An International Journal (WPCO), Volume 137, Issue 4Pages 1997–2036https://doi.org/10.1007/s11277-024-11391-xAbstractThe decision-making process in Industrial Wireless Sensor Networks heavily relies on the information provided by smart sensors. Ensuring the trustworthiness of these sensors is essential to prolong the lifetime of the network. Additionally, ...
- research-articleJuly 2024
Validity constraints for data analysis workflows
- Florian Schintke,
- Khalid Belhajjame,
- Ninon De Mecquenem,
- David Frantz,
- Vanessa Emanuela Guarino,
- Marcus Hilbrich,
- Fabian Lehmann,
- Paolo Missier,
- Rebecca Sattler,
- Jan Arne Sparka,
- Daniel T. Speckhard,
- Hermann Stolte,
- Anh Duc Vu,
- Ulf Leser
Future Generation Computer Systems (FGCS), Volume 157, Issue CPages 82–97https://doi.org/10.1016/j.future.2024.03.037AbstractPorting a scientific data analysis workflow (DAW) to a cluster infrastructure, a new software stack, or even only a new dataset with some notably different properties is often challenging. Despite the structured definition of the steps (tasks) ...
Highlights- Portability and adaptability of scientific workflows suffer from hidden assumptions.
- Validity constraints in workflow languages make hidden assumption explicit.
- Validity constraints ensure integrity and enable conformance checking ...
- research-articleJuly 2024
Deep learning enabled intrusion detection system for Industrial IOT environment
Expert Systems with Applications: An International Journal (EXWA), Volume 249, Issue PChttps://doi.org/10.1016/j.eswa.2024.123808AbstractThe prevalence of security vulnerabilities in Internet of Things (IoT) applications poses a serious threat to enterprise systems, necessitating sophisticated and reliable defense solutions to counter emerging and evolving threats. For the ...
-
- review-articleJuly 2024
A conceptual and architectural characterization of antifragile systems
Journal of Systems and Software (JSSO), Volume 213, Issue Chttps://doi.org/10.1016/j.jss.2024.112051AbstractAntifragility is one of the terms that have recently emerged with the aim of indicating a direction that should be pursued toward the objective of designing Information and Communications Technology systems that remain trustworthy despite their ...
Highlights- We present a conceptual characterization of antifragility.
- We discuss the inclusion of antifragility in the well-known dependability taxonomy.
- We derive a possible path toward the engineering of antifragile systems.
- research-articleJune 2024
SDK4ED: a platform for building energy efficient, dependable, and maintainable embedded software
- Miltiadis Siavvas,
- Dimitrios Tsoukalas,
- Charalambos Marantos,
- Lazaros Papadopoulos,
- Christos Lamprakos,
- Oliviu Matei,
- Christos Strydis,
- Muhammad Ali Siddiqi,
- Philippe Chrobocinski,
- Katarzyna Filus,
- Joanna Domańska,
- Paris Avgeriou,
- Apostolos Ampatzoglou,
- Dimitrios Soudris,
- Alexander Chatzigeorgiou,
- Erol Gelenbe,
- Dionysios Kehagias,
- Dimitrios Tzovaras
Automated Software Engineering (KLU-AUSE), Volume 31, Issue 2https://doi.org/10.1007/s10515-024-00450-zAbstractDeveloping embedded software applications is a challenging task, chiefly due to the limitations that are imposed by the hardware devices or platforms on which they operate, as well as due to the heterogeneous non-functional requirements that they ...
- ArticleAugust 2024
Towards the Online Reconfiguration of a Dependable Distributed On-Board Computer
AbstractOn-board Computers (OBC) are at the centre of space-faring systems. They provide computational performance to the system with high availability and dependability. However, these systems typically consist of expensive, slow, fault-tolerant hardware ...
- research-articleMay 2024
Exploring the impact of chaos engineering with various user loads on cloud native applications: an exploratory empirical study
AbstractOne of the most popular models that provide computer resources today is cloud computing. Today’s dynamic and successful platforms are created to take advantage of various resources available from service providers. Ensuring the performance and ...
- research-articleMarch 2024
Dependability of Network Services in the Context of NFV: A Taxonomy and State of the Art Classification
Journal of Network and Systems Management (JNSM), Volume 32, Issue 2https://doi.org/10.1007/s10922-024-09810-2AbstractIn the context of Network Function Virtualization (NFV), Network Services (NS) are realized by interconnecting Virtual Network Functions (VNF) using Virtual Links (VL). Service dependability is an important characteristic of NSs. Service ...
- research-articleFebruary 2024
An intelligent algorithm of amyloid plucks to timely fault-predicting and contending dependability in IoMT
Expert Systems with Applications: An International Journal (EXWA), Volume 238, Issue PDhttps://doi.org/10.1016/j.eswa.2023.122068Highlights- Assessing dependability based on the application priority of IoMT.
- Graph mapping based on the patterns of the human brain’s cells.
- Predicting the faulty area through inspiration from distributing amyloid plucks.
- Phagocyte ...
The security problem and the demand for service availability create risky conditions for individuals connected to the Internet of Medical Things (IoMT) technology. They are vulnerable to passive and active attacks involving the sharing of ...
- research-articleFebruary 2024
Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach
Cluster Computing (KLU-CLUS), Volume 27, Issue 5Pages 6059–6079https://doi.org/10.1007/s10586-023-04259-5AbstractEffective quality management plays a pivotal role in ensuring the smooth operation of smart city systems, which have significant implications for safety, accessibility, affordability, and maintainability. Dependability of autonomous systems is of ...
- research-articleFebruary 2024
Scalable atomic broadcast: A leaderless hierarchical algorithm
- Lucas V. Ruchel,
- Edson Tavares de Camargo,
- Luiz Antonio Rodrigues,
- Rogério C. Turchetti,
- Luciana Arantes,
- Elias Procópio Duarte
Journal of Parallel and Distributed Computing (JPDC), Volume 184, Issue Chttps://doi.org/10.1016/j.jpdc.2023.104789AbstractAtomic Broadcast is an essential broadcast primitive as it ensures the consistency of distributed replicas. However, it is notoriously non-scalable. In this work, we introduce the Leaderless Hierarchical Atomic Broadcast (LHABcast) algorithm, ...
Highlights- LHABcast is a fully decentralized leaderless algorithm broadcast algorithm.
- LHABcast organizes processes on a vCube, which has several logarithmic properties.
- LHABcast uses autonomic spanning trees rooted at the sender for message ...
- ArticleDecember 2023
Operationalizing Assurance Cases for Data Scientists: A Showcase of Concepts and Tooling in the Context of Test Data Quality for Machine Learning
- Lisa Jöckel,
- Michael Kläs,
- Janek Groß,
- Pascal Gerber,
- Markus Scholz,
- Jonathan Eberle,
- Marc Teschner,
- Daniel Seifert,
- Richard Hawkins,
- John Molloy,
- Jens Ottnad
Product-Focused Software Process ImprovementPages 151–158https://doi.org/10.1007/978-3-031-49266-2_10AbstractAssurance Cases (ACs) are an established approach in safety engineering to argue quality claims in a structured way. In the context of quality assurance for Machine Learning (ML)-based software components, ACs are also being discussed and appear ...
- research-articleDecember 2023
What We Know About Software Dependability in DevOps - A Tertiary Study
SBQS '23: Proceedings of the XXII Brazilian Symposium on Software QualityPages 178–187https://doi.org/10.1145/3629479.3629502Background: DevOps is viewed as an alternative approach to achieving high-quality software products. Dependability is recognized as a crucial aspect of software product quality. Existing literature highlights the lack of established standards, models, or ...
- research-articleOctober 2023
Capacity planning for dependable services
AbstractFault-tolerance techniques depend on replication to enhance availability, albeit at the cost of increased infrastructure costs. This results in a fundamental trade-off: Fault-tolerant services must satisfy given availability and performance ...
- research-articleOctober 2023
Leveraging Time Series Autocorrelation Through Numerical Differentiation for Improving Failure Prediction
LADC '23: Proceedings of the 12th Latin-American Symposium on Dependable and Secure ComputingPages 70–79https://doi.org/10.1145/3615366.3615423Given the complexity of modern software systems, it is no longer possible to detect every fault before deployment. Such faults can eventually lead to failures at runtime, compromising the business process and causing significant risk or losses. Online ...
- research-articleOctober 2023
Diamond-P-vCube: An Eventually Perfect Hierarchical Failure Detector for Asynchronous Distributed Systems
LADC '23: Proceedings of the 12th Latin-American Symposium on Dependable and Secure ComputingPages 40–49https://doi.org/10.1145/3615366.3615420In this work, we introduce ◊P-vCube, a push-based failure detector for asynchronous distributed systems. Processes running ◊P-vCube are hierarchically organized on the vCube virtual topology, which presents several logarithmic properties. As there are ...
- ArticleOctober 2023
Dependability Analysis of UPS Architectures for the Italian Railway Signaling System
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and CertificationPages 98–114https://doi.org/10.1007/978-3-031-43366-5_6AbstractContinuous power supply in railway systems is vital to guarantee dependable accomplishment of energy-supported critical operations. With reference to the Italian railway infrastructure, this paper focuses on the railroad signaling system, used to ...
- ArticleSeptember 2023
Improving Road Traffic Safety and Performance–Barriers and Directions Towards Cooperative Automated Vehicles
Computer Safety, Reliability, and Security. SAFECOMP 2023 WorkshopsPages 283–294https://doi.org/10.1007/978-3-031-40953-0_24AbstractThe complexity of deploying automated vehicles (AVs) has been grossly underestimated and vehicles at high levels of automated driving (SAE level 4 and above) have so far only been deployed in very limited areas. Highly automated AVs will face ...