DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo

Size: px
Start display at page:

Download "DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo"

Transcription

1 DepCoS-RELCOMEX 2006 Los Alamitos, California Washington Tokyo

2 Copyright 2006 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number P2565 ISBN: ISBN 13: Library of Congress Number Additional copies may be ordered from: IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., P.O. Box 3014 Piscataway, NJ Minami-Aoyama Los Alamitos, CA Tel: Minato-ku, Tokyo Tel: Fax: JAPAN Fax: Tel: csbooks@computer.org customer-service@ieee.org Fax: tokyo.ofc@computer.org Individual paper REPRINTS may be ordered at: reprints@computer.org Editorial production by Silvia Ceballos Cover art production by Alex Torres The DepCoS logo and cover design by Tomasz Zamojski Printed in the United States of America by Applied Digital Imaging IEEE Computer Society Conference Publishing Services

3 DepCoS-RELCOMEX 2006 Table of Contents Program Committee...ix Organizing Committee...x Preface...xi MODELING UML Based Reverse Engineering for the Verification of Railway Control Logics... 3 Chiara Abbaneo, Francesco Flammini, Armando Lazzaro, Pietro Marmo, Nicola Mazzocca, and Angela Sanseviero Compatibility of Software Components - Modeling and Verification D. C. Craig and W. M. Zuberek Feasibility Analysis of MDA-Based Database Design Iwona Dubielewicz, Bogumila Hnatkowska, Zbigniew Huzar, and Lech Tuzinkiewicz Embedded Systems Modeling Language Artur Krystosik State Model of Service Reliability Z. Lipi ski Partially Automatic Generation of Fault-Trees with Time Dependencies Jan Magott and Pawel Skrobanek Formal Semantics and Reasoning about UML Class Diagram Marcin Szlenk METHODOLOGY AND TOOLS Information Security Systems vs. Critical Information Infrastructure Prorection Systems - Similarities and Differences Andrzej Bialas Security Level Estimation as a Function of Residual Risks Radoslaw Brendel and Henryk Krawczyk Enhancing Fault Injection Testbench J. Sosnowski, P. Gawkowski, P. Zygulski, and A. Tymoczko

4 Hazard Prevention by Forced Time Constraints Grzegorz Golaszewski and Janusz Górski An Approach for Evaluating Trust in IT Infrastructure Marek Zagórski and Janusz Górski Introduction to the Dependability Modeling of Computer Systems Wojciech Zamojski and Dariusz Caban DEPENDABILITY OF COMPUTER NETWORKS Survey of Recovery Schemes in MPLS Networks Luísa Jorge and Teresa Gomes d-hmac Dynamic HMAC Function Mohannad Najjar and Firas Najjar Security Aspects of SCADA and Corporate Network Interconnection: An Overview Paulo S. Motta Pires and Luiz Affonso H.G. Oliveira Building Dependable Intrusion Prevention Systems Jakub Botwicz, Piotr Sapiecha, and Piotr Buciak Bandwidth Control in Redundant News Server Links Tomasz R. Surmacz Fault-Tolerant Topological Design for Computer Networks Ewa Szlachcic SOFTWARE SECURITY AND RELIABILITY Selecting Technology for Disaster Recovery Rafa Cegie a Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems Jan-Thomas Czornack, Carsten Trinitis, and Max Walter Applying Software Rejuvenation in a Two Node Cluster System for High Availability V. P. Koutras and A. N. Platis Security of Web Services H. Krawczyk and M. Wielgus Model-Based Automatic Test Generation for Event-Driven Embedded Systems Using Model Checkers Zoltán Micskei and István Majzik

5 An Empirical Study of Specification-Based Program Review Approach Fumiko Nagoya, Yuting Chen, and Shaoying Liu Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix Luai Al Shalabi and Zyad Shaaban Evaluation of Dependability of Multi-tier Internet Business Applications with Queueing Networks Andrzej Zalewski and Andrzej Ratkowski Security Enhancement of Java Remote Method Invocation Dominik Zalewski MULTI AGENT SYSTEMS Byzantine Fault Tolerance for Agent Systems Tadashi Araragi CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack Velik Bellemin and Tadashi Araragi A Distributed Intrusion Detection Framework Based on Autonomous and Mobile Agents Dalila Boughaci, Habiba Drias, Ahmed Bendib, Youcef Bouzni, and Belaid Benhamou A Distributed Firewall Using Autonomous Agents Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, and Belaid Benhamou A Regulatory Software Maintenance Environment Using Agent-Based Software Configuration Management I-Hsin Chou and Chin-Feng Fan FAULT TOLERANCE IN DIGITAL SYSTEMS Self-Dual Modules in Design of Dependable Digital Devices Janusz Biernat Low-Cost and Universal Secure Scan: A Design-for-Test Architecture for Crypto Chips Marcin Gomolkiewicz, Maciej Nikodem, and Tadeusz Tomczak CAD Software for Designing of Totally Self Checking Sequential Circuits Jerzy W. Greblicki Residue Arithmetic in FPGA Matrices Tadeusz Tomczak

6 APPLICATIONS Risk Assessment Tool for Maintenance Selection George J. Anders and Jaroslaw Sugier Securing of Integrated Protection of Technical Information by Application of Special Engineering Decisions Oleg Berestnev and Evgeniy Haritonov A Multi-tier Architecture to Safely Share Digital Medical Images Samia Boucherkha and Mohamed Benmohamed Digital Instrumental and Control Failure Events Derivation and Analysis for Advanced Boiling Water Reactor Hui-Wen Huang, Wei-Yi Yang, Chunkuan Shih, Swu Yih, Yi-Bin Chen, Yen-Chang Tzeng, Cherng-Tsong Kuo, Chan-Fu Chuang, Ming-Huei Chen, Yuan-Chang Yu, Li-Hsin Wang, Hsun-Ho Wang, Chun-Yu Chen, and Wan-Tsz Tu A Fault Tolerant Optimization Algorithm Based on Evolutionary Computation Francisco Fernández de Vega Efficiency of Reliability Evaluation of LargeElectric Power Systems B. Kalinowski and George Anders Estimation of Impact of Maintenance Policies on Equipment Risk of Failure Henryk Maciejewski and George Anders Computer Modeling and Simulation of Discrete Transport System with Dispatcher for Reliability and Economic Analysis Jacek Mazurkiewicz and Tomasz Walkowiak Fuzzy Approach to Economic Analysis of Dispatcher Driven Discrete Transport systems Tomasz Walkowiak and Jacek Mazurkiewicz Conception of Composing Learning Content into Learning Tree to Ensure Reliability of Learning Material Marek Woda Author Index

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,

More information

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical

More information

Sixth IEEE International Symposium on High Assurance Systems Engineering

Sixth IEEE International Symposium on High Assurance Systems Engineering Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking 22-24 October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical

More information

Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)

Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce

More information

(DepCos-RELCOMEX 2009)

(DepCos-RELCOMEX 2009) 2009 4th International Conference on Dependability of Computer Systems (DepCos-RELCOMEX 2009) Brunow, Poland 30 June 2 July 2009 IEEE Catalog Number: ISBN: CFP0944A-PRT 978-1-4244-4322-2 2009 Fourth International

More information

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS

More information

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003

More information

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002 Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i [blank page] ii Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 16-18 December

More information

Software Reliability Engineering

Software Reliability Engineering Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

DepCoS - RELCOMEX 2008

DepCoS - RELCOMEX 2008 Institute of Computer Engineering, Control and Robotics Wroc³aw University of Technology with support from Moscow Power Engineering Institute (Technical University) Proceedings of International Conference

More information

2017 International Conference on Communication Technologies (ComTech 2017)

2017 International Conference on Communication Technologies (ComTech 2017) 2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute

More information

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored

More information

th International Conference on Telecommunications (ICT 2017)

th International Conference on Telecommunications (ICT 2017) 2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical

More information

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

More information

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels

More information

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001 Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing 17-1 9 December

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

Multi-Core Programming

Multi-Core Programming Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part

More information

An object of research has changed System events System renewal Mathematical computer tools reliability dependability

An object of research has changed System events System renewal Mathematical computer tools reliability dependability Preface The conference DepCoS - RELCOMEX '06 is organized by the Institute of Computer Engineering, Control and Robotics (previously the Institute of Engineering Cybernetics), Wroclaw University of Technology.

More information

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) 2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

Study Guide. Robert Schmidt Dane Charlton

Study Guide. Robert Schmidt Dane Charlton Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

Task-level simulation of service based information systems

Task-level simulation of service based information systems Task-level simulation of service based information systems Tomasz Walkowiak Wroclaw University of Technology, Poland tomasz.walkowiak@pwr.wroc.pl Maciej Woropay University of Technology and Life Sciences

More information

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions

INTRUSION DETECTION AND CORRELATION. Challenges and Solutions INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Tokyo. Copyright 2013 FUJITSU LIMITED

Tokyo. Copyright 2013 FUJITSU LIMITED Shaping Tomorrow Through Modernization and Innovation Noriyuki Toyoki Corporate Senior Vice President Fujitsu Limited Tokyo Fujitsu Vision Human Centric Intelligent Society Fujitsu Technology and Service

More information

Securing SCADA Systems. Ronald L. Krutz

Securing SCADA Systems. Ronald L. Krutz Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,

More information

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize

More information

2. Firewall Management Tools used to monitor and control the Firewall Environment.

2. Firewall Management Tools used to monitor and control the Firewall Environment. Firewall Review Section 1 FIREWALL MANAGEMENT & ADMINISTRATION Common management practices with regard to administering the (company) network should be in accordance with company policies and standards.

More information

Proceedings of The Second International Conference on Web Information Systems Engineering

Proceedings of The Second International Conference on Web Information Systems Engineering Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun

More information

Toward Intrusion Tolerant Clouds

Toward Intrusion Tolerant Clouds Toward Intrusion Tolerant Clouds Prof. Yair Amir, Prof. Vladimir Braverman Daniel Obenshain, Tom Tantillo Department of Computer Science Johns Hopkins University Prof. Cristina Nita-Rotaru, Prof. Jennifer

More information

Microprocessor Theory

Microprocessor Theory Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A

More information

Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788

Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788 Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788 Outline Introduction - What is the problem? - What is the solution? - Motivating Example - How ABSP addresses these challenges?

More information

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems

An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems Algirdas Avižienis Vytautas Magnus University, Kaunas, Lithuania and University of California, Los

More information

Practical Database Programming with Visual Basic.NET

Practical Database Programming with Visual Basic.NET Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Analysis on the application of on-chip redundancy in the safety-critical system

Analysis on the application of on-chip redundancy in the safety-critical system LETTER IEICE Electronics Express, Vol.11, No.9, 1 7 Analysis on the application of on-chip redundancy in the safety-critical system Bai-gen Cai 1, Cheng-ming Jin 1a), Lian-chuan Ma 1, Yuan Cao 1, and Hideo

More information

VPN Connection. VPN Gateway. 17 December 2002

VPN Connection. VPN Gateway. 17 December 2002 VPN Connection to ZyXEL ZyWALL VPN Gateway 17 December 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to

More information

Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs

Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs Tobias Oder and Tim Güneysu Ruhr-University Bochum Latincrypt 2017 20.09.2017 Public-Key Crypto and Long-Term Security 2 Lattice-Based Cryptography

More information

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem

Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,

More information

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang

More information

Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems

Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems PROCEEDINGS Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems Copyright 1996 by National Sun Yat-Sen University All rights reserved. Abstracting

More information

AR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors

AR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors AR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors Computer Sciences Department University of Wisconsin Madison http://www.cs.wisc.edu/~ericro/ericro.html ericro@cs.wisc.edu High-Performance

More information

Overlay control methodology comparison: field-by-field and high-order methods

Overlay control methodology comparison: field-by-field and high-order methods Overlay control methodology comparison: field-by-field and high-order methods Chun-Yen Huang a, Chui-Fu Chiu a, Wen-Bin Wu a, Chiang-Lin Shih a, Chin-Chou Kevin Huang* b, Healthy Huang c, DongSub Choi

More information

Analysis on the Application of On-chip Redundancy in the Safety-critical System

Analysis on the Application of On-chip Redundancy in the Safety-critical System This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Analysis on the Application of On-chip Redundancy

More information

WAN VPN Solutions. How Cisco Uses VPN Solutions to Extend the WAN. A Cisco on Cisco Case Study: Inside Cisco IT

WAN VPN Solutions. How Cisco Uses VPN Solutions to Extend the WAN. A Cisco on Cisco Case Study: Inside Cisco IT WAN VPN Solutions How Cisco Uses VPN Solutions to Extend the WAN A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Finding cost-effective alternatives to dedicated circuits connecting remote

More information

Three Pillars of Effective Disaster Recovery

Three Pillars of Effective Disaster Recovery WHITE PAPER Three Pillars of Effective Disaster Recovery 1 WHITE PAPER Three Pillars of Effective Disaster Recovery: DRaaS + Networking + Managed Hosting Disaster Recovery is following the paths of other

More information

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

More information

Algorithms and Parallel Computing

Algorithms and Parallel Computing Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All

More information

ABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data

ABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data RnD Consulting LLC 957 Route 33 PMB 143 Hamilton Square, NJ 08690 Tel. (800) 949-8215 Fax. (609) 586-1712 mike@rndconsultingnj.com josh@rndconsultingnj.com ABOUT US A Legacy of Providing Solutions With

More information

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards

More information

SCADA virtual instruments management

SCADA virtual instruments management Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 15 ( 2014 ) 1259 1264 Emerging Markets Queries in Finance and Business SCADA virtual instruments management Traian

More information

The Internet of Things for Petroleum Transportation

The Internet of Things for Petroleum Transportation 2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 The Internet of Things for Petroleum Transportation Hui-ran WANG 1 and Rui-fang MA

More information

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN:

2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 978-1-60595-502-5 Design of Attendance Check System Based on Ethernet Technology and Fingerprint Recognition

More information

Implementing Security and Tokens: Current Standards, Tools, and Practices

Implementing  Security and Tokens: Current Standards, Tools, and Practices Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices

More information

Seminar Software Quality and Safety

Seminar Software Quality and Safety Seminar Software Quality and Safety SCADE a model-driven Software Development Environment by Dominik Protte Software Engineering Group Universität Paderborn Motivation Many safety-critical components in

More information

TASK SCHEDULING FOR PARALLEL SYSTEMS

TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL

More information

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing

More information

ECBS Engineering of Computer-Based Systems. Novi Sad, Serbia April IEEE 19th International Conference and Workshops on

ECBS Engineering of Computer-Based Systems. Novi Sad, Serbia April IEEE 19th International Conference and Workshops on ECBS 2012 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems Conference Information Papers by Session Papers by Author Getting Started Search Trademarks Sponsored

More information

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition

Philip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7

More information

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness

Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness 2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,

More information

Encyclopedia of Information Science and Technology

Encyclopedia of Information Science and Technology Encyclopedia of Information Science and Technology Second Edition Mehdi Khosrow-Pour Information Resources Management Association, USA Volume IV G-Internet INFORMATION SCIENCE REFERENCE Hershey New York

More information

VPN Connection. 8 October 2002

VPN Connection. 8 October 2002 VPN Connection to Cisco IOS Router 8 October 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to a private

More information

Super-Peer Architectures for Distributed Computing

Super-Peer Architectures for Distributed Computing Whitepaper Super-Peer Architectures for Distributed Computing Fiorano Software, Inc. 718 University Avenue, Suite 212 Los Gatos, CA 95032 U.S.A. +1.408.354.3210 email info@fiorano.com www.fiorano.com Entire

More information

Study on Computer Network Technology of Digital Library

Study on Computer Network Technology of Digital Library International Symposium on Computers & Informatics (ISCI 2015) Study on Computer Network Technology of Digital Library Yanming Sui LinYi University, Linyi, China suiyanming@lyu.edu.cn Abstract With the

More information

Riverbed Granite Use Cases

Riverbed Granite Use Cases WHITE PAPER Riverbed Granite Use Cases Riverbed Technical Marketing Purpose The following whitepaper outlines the use cases addressed by Riverbed Granite. Audience This whitepaper is intended for Riverbed

More information

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15

Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure

More information

Network and Security infrastructure

Network and Security infrastructure Network and Security infrastructure Industry Day, Bologna, 16 January 2019 Ahmed Benallegue Networks and Security Workstream Leader Bologna January Bologna 16, 2019 January 16, 2019 Agenda Introduction

More information

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,

More information

Overview. System architectures Software layers Architectural models. Design requirements. client-server, peer processes, mobile code, agents,...

Overview. System architectures Software layers Architectural models. Design requirements. client-server, peer processes, mobile code, agents,... Architectural Models Overview System architectures Software layers Architectural models client-server, peer processes, mobile code, agents,... Design requirements user expectations of the system 3 January,

More information

Fault-tolerant in wireless sensor networks using fuzzy logic

Fault-tolerant in wireless sensor networks using fuzzy logic International Research Journal of Applied and Basic Sciences 2014 Available online at www.irjabs.com ISSN 2251-838X / Vol, 8 (9): 1276-1282 Science Explorer Publications Fault-tolerant in wireless sensor

More information

Clock Skew Based Client Device Identification in Cloud Environments

Clock Skew Based Client Device Identification in Cloud Environments Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech. 1 Wei-Chung Teng on behalf of Assoc.

More information

Curriculum 2013 Knowledge Units Pertaining to PDC

Curriculum 2013 Knowledge Units Pertaining to PDC Curriculum 2013 Knowledge Units Pertaining to C KA KU Tier Level NumC Learning Outcome Assembly level machine Describe how an instruction is executed in a classical von Neumann machine, with organization

More information

SOC 3 for Security and Availability

SOC 3 for Security and Availability SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust

More information

Stingray Traffic Manager 9.0

Stingray Traffic Manager 9.0 WHITE PAPER Stingray Traffic Manager 9.0 Network Deployment Options CONTENTS Introduction... 2 Stingray Aptimizer products... 2 Stingray Aptimizer for SharePoint and Windows IIS deployments... 2 Stingray

More information

A GPFS Primer October 2005

A GPFS Primer October 2005 A Primer October 2005 Overview This paper describes (General Parallel File System) Version 2, Release 3 for AIX 5L and Linux. It provides an overview of key concepts which should be understood by those

More information

Beijing, China,

Beijing, China, ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,

More information

White paper PRIMEQUEST 1000 series high availability realized by Fujitsu s quality assurance

White paper PRIMEQUEST 1000 series high availability realized by Fujitsu s quality assurance White paper PRIMEQUEST 1000 series high availability realized by Fujitsu s quality assurance PRIMEQUEST is an open enterprise server platform that fully maximizes uptime. This whitepaper explains how Fujitsu

More information

Data Warehousing and Data Mining Techniques for Cyber Security

Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA

More information

Process Valve Networking 101: What, Why and How Much?

Process Valve Networking 101: What, Why and How Much? Process Valve Networking 101: What, Why and How Much? Manufacturers have quickly come to realize that the only way to see a return on investment is to optimize enterprise and plant operations at every

More information

Digital Humanities Digital Economics. Digital Arts. 05. One elective course from the courses offered at the university faculties

Digital Humanities Digital Economics. Digital Arts. 05. One elective course from the courses offered at the university faculties Table 1. First study cycle 1 Year 1 semester 01. 10.9.AITMIR.1101.C е-democracy 02. 04.0.AITMIR.1102.C е-management 03. 08.9.AITMIR.1103.C е-ethics 04. One elective course from the following list 1. 08.0.AITMIR.1104.MaE

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Internet of Things Group 2 Internet of Things Group 3 Autonomous systems: computing platform Intelligent eyes Vision. Intelligent

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics

Software Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of

More information

White paper June ARINC RailwayNet HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION

White paper June ARINC RailwayNet HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION White paper June 2016 ARINC RailwayNet SM HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION Background Improving rail safety The National Transportation Safety Board (NTSB) has attributed a number

More information

The Design and Implementation of a Low-Latency On-Chip Network

The Design and Implementation of a Low-Latency On-Chip Network The Design and Implementation of a Low-Latency On-Chip Network Robert Mullins 11 th Asia and South Pacific Design Automation Conference (ASP-DAC), Jan 24-27 th, 2006, Yokohama, Japan. Introduction Current

More information

Relational Database Index Design and the Optimizers

Relational Database Index Design and the Optimizers Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers

More information

Linux Command Line and Shell Scripting Bible

Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,

More information

Block Sparse and Addressing for Memory BIST Application

Block Sparse and Addressing for Memory BIST Application Block Sparse and Addressing for Memory BIST Application Mohammed Altaf Ahmed 1, D Elizabath Rani 2 and Syed Abdul Sattar 3 1 Dept. of Electronics & Communication Engineering, GITAM Institute of Technology,

More information

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648

Kuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648 Kuan-Wen Chen Assistant Professor Department of Computer Science National Chiao Tung University Hsinchu, Taiwan +886-3-5712121#31648 kuanwen@cs.nctu.edu.tw SUMMARY Expertise in computer vision, pattern

More information

Distribution Transparencies For Integrated Systems*

Distribution Transparencies For Integrated Systems* Distribution Transparencies For Integrated Systems* Janis Putman, The Corporation Ground System Architectures Workshop 2000 The Aerospace Corporation February 2000 Organization: D500 1 * The views and

More information

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE

A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia

More information

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle

Join the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our

More information

Modern Experimental Design

Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.

More information