dependable software

Top PDF dependable software:

An automated wrapper based approach to the design of dependable software

An automated wrapper based approach to the design of dependable software

As computer systems become pervasive, our reliance on computer software to provide correct and timely services is ever-increasing. To meet these demands it is important that software be dependable [1]. It has been shown that a dependable software must contain two types of artefact; (i) error detection mechanisms (EDMs) and (ii) error recov- ery mechanisms (ERMs) [2], where EDMs are commonly known as detectors and ERMs as correctors. A detector is a component that asserts the validity of a predicate during execution, whilst a corrector is a component that enforces a predicate. Examples of detectors include runtime checks and error detection codes. Examples of correctors include exception handlers and retry [3]. During the execution of a dependable software, an EDM at a given location evaluates whether the corresponding predicate holds at that location, i.e., it attempts to detect an erroneous state. When an erroneous state is detected, an ERM will attempt to restore a suitable state by enforcing a predicate, i.e., it attempts to recover from an erroneous state. Using EDMs and ERMs it is possible to address the error propagation problem. A failure to contain the propagation of erroneous state across a software is known to make recovery more difficult [4].
Show more

9 Read more

The early identification of detector locations in dependable software

The early identification of detector locations in dependable software

Our main objective was to develop an approach that al- lows early identification of effective detector locations in dependable software design. Current metrics operate at a late stage of the software development lifecycle, making them potentially undesirable, as any problem may require expensive software redesign or reengineering. On the other hand, the early identification of detector locations allows software engineers to incorporate and investigate the effi- ciency of detectors much earlier in software development. Our approach is based on identifying a correlation between a static metric (module coupling) and a dynamic metric (spatial impact). In particular, we showed that a correlation exists between these two metrics, based on fault injection experiments conducted on two different software from dif- ferent application domains. Then, based on this correlation, we identified potential detector locations in another software system using module coupling values as a guide. Our results demonstrate that our approach is promising, as fault injection experiments performed on the indicated locations can lead to a 1000-fold reduction in system failures.
Show more

11 Read more

Creating a Free, Dependable Software Engineering Environment for Building Java Applications

Creating a Free, Dependable Software Engineering Environment for Building Java Applications

Although many projects have been successful (Linux [13] and Apache [2] are two examples), there is still a need for free tools to create dependable software. We have examined a variety of free tools to assess the current state of free soft- ware development using an Athlon class machine running

5 Read more

Dependable software development. Programming techniques for building dependable software systems.

Dependable software development. Programming techniques for building dependable software systems.

• Hardware and software system architectures that support hardware and software redundancy and a fault tolerance controller that detects problems and supports fault recovery • These are [r]

52 Read more

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

Permanent repository link: http://openaccess.city.ac.uk/15284/ Link to published version: http://dx.doi.org/10.1016/j.comnet.2016.06.028 Copyright and reuse: City Research Online aims to[r]

6 Read more

Patterns for the design of secure and dependable software defined networks

Patterns for the design of secure and dependable software defined networks

need to be resolved. These difficulties stem from the highly distributed and hetero- geneous nature of SDN and the extent of intelligence, dependability and security that they need to demonstrate during their operation. The design and verification meth- ods for developing secure and dependable system networks is necessary and should be considered at design level to guarantee security and mitigate safety threats, on remote

26 Read more

MAINSTREAMING THE SOCIAL MEDIA AS DEPENDABLE NEWS SOURCES

MAINSTREAMING THE SOCIAL MEDIA AS DEPENDABLE NEWS SOURCES

Despite the ubiquitous infiltration of information communication technologies (ICTs) into our lives, research on the use of the social media as alternate and dependable news sources is at a nascent stage. Today, Communication is witnessing a paradigm shift from conventionalism to modern social media, which includes varying social media platforms. The Tech-Determinist Theory has pointed, in the contemporary society, to a situation where mass media audiences are changing the outlets where they search for the news. This research adopted the survey methodological approach, with a study population of 3,682 comprising all the people in the contact of the researchers across the various social media platforms which include: Badoo, Whatsapp, Facebook, Twitter, and Blackberry Messenger (BBM). A sample size of 348 was determined for the study using the Australian National Statistical Service online sampling calculator. Evidence from research data shows that besides being used for meeting their information needs, social media have been adjudged by the users as dependable news sources. Also, research finding shows that the more frequently a social medium is used, the higher perceived dependability of such medium as a news source. In consonance with the technological determinism theory, the advancement of media technology determines the media used in communication by the people. This, the researchers conclude, is responsible for the modern social media channels being used for news dissemination and reception. To effectively mainstream the social media as news sources, there is the need to train special corps of reporters to take over the business of news dissemination on the social media platforms. This is to guard against quacks from abusing the social media with deliberate dissemination of falsehood.
Show more

21 Read more

Simulation Framework for the Evaluation of Dependable Distributed Systems

Simulation Framework for the Evaluation of Dependable Distributed Systems

MONARC is a generic simulation framework designed for modeling a wide range of distributed systems technologies, with respect to their specific components and characteristics. Its simulation model incorporates the necessary components to model various modern-day distributed systems technologies, providing the mechanisms to describe concurrent network traffic and to evaluate different strategies in data replication or in the job scheduling procedures. In this paper we described a solution to simulating dependable distributed systems using MONARC. The solution is able to model failures in distributed systems at hardware level (abnormalities in the functionality of hardware components) or software level (the middleware or application deviating from their normal functionality or delivery of services). We aim at extending MONARC to account for types of failures (at hardware and software levels), modeling their occurrences and detection, as well as recovery and masking (redundancy) mechanisms.
Show more

11 Read more

A Virtualization-based Approach to Dependable Service Computing

A Virtualization-based Approach to Dependable Service Computing

3. An architectural model for dependability in large scale distributed systems. The proposed dependability approach is part of the architectural model that we proposed in [1]. The general approach to ensuring fault tolerance in LSDS consists of an extensible architecture that integrates services designed to handle a wide-range of failures, both hardware and software. These services can detect, react, and confine problems in order to minimize damages. By learning and predicting algorithms they are able to increase the survivability of the distributed system. They include services designed to reschedule jobs when resources on which they execute fail, services capable to replicate their behavior in order to increase resilience, services designed to monitor and detect problems, etc. The proposed architecture is also based on a minimal set of functionalities, absolutely necessary to ensure the fault tolerance capability of distributed systems.
Show more

14 Read more

Design of Dependable and Trustworthiness Of Data Communication In WSN

Design of Dependable and Trustworthiness Of Data Communication In WSN

2.2 Trust Decision-Making at CH Level: In cluster WSNs, CHs form a virtual backbone for intercluster routing where CHs can forward the aggregated data to the central BS through other CHs. Thus, the selection of CHs is a very important step for dependable communication. In our LDTS, the GTD of a CH is evaluated by two information sources CH-to-CH direct trust and BS-to-CH feedback trust. During CH-to-CH communication, the CH maintains the records of past interactions of another CH in the same manner as CMs keeps interaction records of their neighbors. Thus, the direct trust value can be computed according to the number of successful and unsuccessful interactions. The BS periodically asks all CHs for their trust ratings on their neighbors. After obtaining the ratings from CHs, the BS will aggregate them to form an effective value of ITD.
Show more

6 Read more

Argument Representation for Dependable Computer-Based Systems

Argument Representation for Dependable Computer-Based Systems

An example of this is the UK's rail transportation network, which is currently overseen by a number of more-or-less independent authorities, including the HSE (UK govern-[r]

29 Read more

Towards the Design of Tunable Dependable Systems

Towards the Design of Tunable Dependable Systems

Fields of application. A methodology such as the one we envision is suited for application scenarios where the de- pendability requirements need to be enforced only in spe- cific working conditions (e.g., when an emergency situa- tion arises) and/or for limited time windows. In these cases, the system can adapt its behavior and expose robust prop- erties with possibly limited performance, or the other way around. To enable this behavior, the methodology can act both on the hardware-level (e.g., FPGA-based systems, on which dynamic partial reconfiguration can be exploited to vary the required reliability of an hardware component) and on the software-level (as in a multi-many core scenario pro- posed as a case-study in Section 3), based on i) how hard- ening techniques can be applied and ii) how the tuning of the hardening is managed. In this paper, the application sce- nario refers to many-core architectures, given the availabil- ity of several processing resources and the opportunity to balance such computational power to achieve high perfor- mance and/or high reliability.
Show more

5 Read more

Another look at the middleware for dependable distributed computing

Another look at the middleware for dependable distributed computing

Abstract Key concepts of reliable distributed computing developed during the 1980s and 1990s (e.g., transactions, replication) influenced the standards based middleware such as CORBA and Java EE. This middleware has evolved steadily over the years with message passing facilities to support construction of loosely coupled systems. However, the way networked computing is being used for business and social uses is undergoing rapid changes as new ways of constructing distributed execution environments from va- rieties of resources, ranging from computational, storage, network to application level services, provided by glob- ally distributed service providers are emerging. In light of these developments, the paper examines what core con- cepts, components, and techniques that will be required in the next-generation middleware for dependable distributed computing. The paper puts forward the case for five top- ics for further research: better coordination facilities for loosely coupled systems, restructuring of the middleware stack for supporting multi-tenancy, replication in the large, negotiation, and enforcement of service agreements, and ac- countability.
Show more

11 Read more

Patterns for dependable and distributed embedded control

Patterns for dependable and distributed embedded control

‘time;name;value’. The format 20-sim likes is ‘time value value value …’ so a time with a value for each input separated by a space or a TAB character. However in the Tripod software not all logging clients (‘logging inputs’) give a value each period, some only log once every couple of seconds, and others like position, speed and force every millisecond. Also the clients do not produce values at exactly the same time. If the data would be stored in a 20-sim like format, then for each new logged value all other values have to be printed again (to be more precise: interpolated), since the new timestamp won’t exactly match with the previous one. This is because it is not possible to skip a value for a certain column in the 20-sim format. A file in the 20-sim format with three value columns will be two times the size of RTLog format and this factor grows with the number of clients.
Show more

63 Read more

Delivering Dependable QoS for Better Bottom Line

Delivering Dependable QoS for Better Bottom Line

• Benchmark Service Prior to Production • Activate 24X7X365 Monitoring Services • Engage Proactive Alerts and Notifications. • Implement Active Low Level Testing 24X7X365 • Execute[r]

20 Read more

Dependable dewatering. High corrosion resistance.

Dependable dewatering. High corrosion resistance.

Star PolyPresses provide low-cost, dependable dewatering of wastewater sludges and process slurries. Only the highest-quality polypropylene plates are used to resist corrosive chemicals, and our standard air blowdown manifolds mean drier, easier-to-release cakes. EPDM gaskets ensure tight seals and long gasket life. Star PolyPresses are compact in construction, too, so they don’t take up excessive, valuable floor space. All hydraulic

8 Read more

LASER GROUP S DEPENDABLE SPIRIT

LASER GROUP S DEPENDABLE SPIRIT

member runs the meeting. “This isn’t us telling them how to run their business; this is us helping to leverage out of them what their dreams are for their life and their business and documenting that in a simple way that they can follow,” says Keil. “Their goals might be lifestyle drivers, aggressive growth, whatever it is; we want to help them achieve that.” After the initial meeting, the consultant and business owner meet at least quarterly, but the client has many additional tools available such as online training systems, webinars, and access to Laser Group’s proprietary software program called ‘Laser Pro,’ which does everything from
Show more

10 Read more

Quality Analysis of Dependable Systems: A Developer Oriented Approach

Quality Analysis of Dependable Systems: A Developer Oriented Approach

Since the early work on ADL definition, there has been a significant effort for defining ADLs that ease the qualitative analysis of software architectures. Specif- ically, a number of existing ADLs come along with tools like theorem provers and model-checkers, allowing the specification of the functional behavior of com- ponents and connectors making up a system, and the verification of properties that must hold for the system against the system’s functional behavior [1, 4]. In existing ADLs, the specification of the system’s behavior is, typically, done using formalisms like logic or process algebras. Hence, to perform qualitative analysis, developers have to learn these formalisms and tools. They further have to derive mappings between the basic architectural concepts (e.g., components, connectors, ports, roles, etc.) they use to specify software architectures and the basic constructs provided by the formalism that is to be used for specifying the system’s functional behavior (e.g., processes, channels, etc.), if these mappings are not already provided by the ADL itself. Neither of the previous tasks is straightforward for everyday developers who are very experienced and educated on the use of object-oriented modeling methods (e.g., UML methods), and sev- eral programming languages like C, C++, Java, but are not experts in logic and process algebras. An evidence of this is provided in the Web site of PVS 10 , a
Show more

23 Read more

Dependable Interaction with an Intelligent Home Care Robot

Dependable Interaction with an Intelligent Home Care Robot

Care-O-bot is the prototype of a multi functional home assistant, to be used by elderly people in order to live independently in their homes for a longer time. Easy, intuitive, and dependable operation of the home care system is essential. The interface to the robot consists of a graphical I/O display, speech in/output and various safety and navigation sensors. A three level safety system has been installed on the robot for dependable collision avoidance. To improve fault tolerance, a sensor library has been developed which enables to load drivers for newly detected devices on the fly. Standardized I/O- and diagnosis methods are provided together with the driver so that correct operation of the sensors can constantly be monitored by the application.
Show more

7 Read more

Trust Model for Dependable File Exchange in Cloud Computing

Trust Model for Dependable File Exchange in Cloud Computing

Trust and security have get to be significant to ensure the sound advancement of cloud stages giving answers for concerns, for example, the absence of protection and insurance, the assurance of security and creator rights, Security and security have been demonstrated to be two essential obstruction concerning the general appropriation of the distributed computing ideal model. With a specific end goal to tackle these issues in the laaS administration layer, a model of dependable distributed computing which gives a shut execution environment to the private execution of virtual machines was proposed. This work has indicated how the issue can be understood utilizing a Trusted Platform Module. The proposed model called 'Dusted Cloud Computing Platform (TCCP) should give larger amounts of unwavering quality, accessibility and security. In this arrangement, them is a group hub that goes about as a Thirsted Coordinator (TC). Dif (min hubs in the group must enlist with the TC so as to guarantee and confirm its key and estimation ion list. The TC keeps a rundown of ousted hubs. At the point when a virtual machine is begun or a movement happens, the TC confirms whether the hub is dependable so that the client of the virtual machine may make certain that the stage stays reliable. A key and a mark are utilized for distinguishing the hub. In the TCCP model, the private accreditation power is included in every exchange together with the TC. Shen et al. introduced a technique for building a dependable distributed computing environment by Incorporating a 'Rusted Computing Platform (TCP) to the distributed computing framework. The TCP is utilized to give confirmation, privacy and uprightness. This plan showed positive results for confirmation, standard based access and information security in the distributed computing environment.
Show more

6 Read more

Show all 10000 documents...