DepCoS-RELCOMEX Los Alamitos, California. Washington Tokyo
|
|
- Conrad Terry
- 5 years ago
- Views:
Transcription
1 DepCoS-RELCOMEX 2006 Los Alamitos, California Washington Tokyo
2 Copyright 2006 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved. Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number P2565 ISBN: ISBN 13: Library of Congress Number Additional copies may be ordered from: IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., P.O. Box 3014 Piscataway, NJ Minami-Aoyama Los Alamitos, CA Tel: Minato-ku, Tokyo Tel: Fax: JAPAN Fax: Tel: csbooks@computer.org customer-service@ieee.org Fax: tokyo.ofc@computer.org Individual paper REPRINTS may be ordered at: reprints@computer.org Editorial production by Silvia Ceballos Cover art production by Alex Torres The DepCoS logo and cover design by Tomasz Zamojski Printed in the United States of America by Applied Digital Imaging IEEE Computer Society Conference Publishing Services
3 DepCoS-RELCOMEX 2006 Table of Contents Program Committee...ix Organizing Committee...x Preface...xi MODELING UML Based Reverse Engineering for the Verification of Railway Control Logics... 3 Chiara Abbaneo, Francesco Flammini, Armando Lazzaro, Pietro Marmo, Nicola Mazzocca, and Angela Sanseviero Compatibility of Software Components - Modeling and Verification D. C. Craig and W. M. Zuberek Feasibility Analysis of MDA-Based Database Design Iwona Dubielewicz, Bogumila Hnatkowska, Zbigniew Huzar, and Lech Tuzinkiewicz Embedded Systems Modeling Language Artur Krystosik State Model of Service Reliability Z. Lipi ski Partially Automatic Generation of Fault-Trees with Time Dependencies Jan Magott and Pawel Skrobanek Formal Semantics and Reasoning about UML Class Diagram Marcin Szlenk METHODOLOGY AND TOOLS Information Security Systems vs. Critical Information Infrastructure Prorection Systems - Similarities and Differences Andrzej Bialas Security Level Estimation as a Function of Residual Risks Radoslaw Brendel and Henryk Krawczyk Enhancing Fault Injection Testbench J. Sosnowski, P. Gawkowski, P. Zygulski, and A. Tymoczko
4 Hazard Prevention by Forced Time Constraints Grzegorz Golaszewski and Janusz Górski An Approach for Evaluating Trust in IT Infrastructure Marek Zagórski and Janusz Górski Introduction to the Dependability Modeling of Computer Systems Wojciech Zamojski and Dariusz Caban DEPENDABILITY OF COMPUTER NETWORKS Survey of Recovery Schemes in MPLS Networks Luísa Jorge and Teresa Gomes d-hmac Dynamic HMAC Function Mohannad Najjar and Firas Najjar Security Aspects of SCADA and Corporate Network Interconnection: An Overview Paulo S. Motta Pires and Luiz Affonso H.G. Oliveira Building Dependable Intrusion Prevention Systems Jakub Botwicz, Piotr Sapiecha, and Piotr Buciak Bandwidth Control in Redundant News Server Links Tomasz R. Surmacz Fault-Tolerant Topological Design for Computer Networks Ewa Szlachcic SOFTWARE SECURITY AND RELIABILITY Selecting Technology for Disaster Recovery Rafa Cegie a Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems Jan-Thomas Czornack, Carsten Trinitis, and Max Walter Applying Software Rejuvenation in a Two Node Cluster System for High Availability V. P. Koutras and A. N. Platis Security of Web Services H. Krawczyk and M. Wielgus Model-Based Automatic Test Generation for Event-Driven Embedded Systems Using Model Checkers Zoltán Micskei and István Majzik
5 An Empirical Study of Specification-Based Program Review Approach Fumiko Nagoya, Yuting Chen, and Shaoying Liu Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix Luai Al Shalabi and Zyad Shaaban Evaluation of Dependability of Multi-tier Internet Business Applications with Queueing Networks Andrzej Zalewski and Andrzej Ratkowski Security Enhancement of Java Remote Method Invocation Dominik Zalewski MULTI AGENT SYSTEMS Byzantine Fault Tolerance for Agent Systems Tadashi Araragi CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack Velik Bellemin and Tadashi Araragi A Distributed Intrusion Detection Framework Based on Autonomous and Mobile Agents Dalila Boughaci, Habiba Drias, Ahmed Bendib, Youcef Bouzni, and Belaid Benhamou A Distributed Firewall Using Autonomous Agents Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, and Belaid Benhamou A Regulatory Software Maintenance Environment Using Agent-Based Software Configuration Management I-Hsin Chou and Chin-Feng Fan FAULT TOLERANCE IN DIGITAL SYSTEMS Self-Dual Modules in Design of Dependable Digital Devices Janusz Biernat Low-Cost and Universal Secure Scan: A Design-for-Test Architecture for Crypto Chips Marcin Gomolkiewicz, Maciej Nikodem, and Tadeusz Tomczak CAD Software for Designing of Totally Self Checking Sequential Circuits Jerzy W. Greblicki Residue Arithmetic in FPGA Matrices Tadeusz Tomczak
6 APPLICATIONS Risk Assessment Tool for Maintenance Selection George J. Anders and Jaroslaw Sugier Securing of Integrated Protection of Technical Information by Application of Special Engineering Decisions Oleg Berestnev and Evgeniy Haritonov A Multi-tier Architecture to Safely Share Digital Medical Images Samia Boucherkha and Mohamed Benmohamed Digital Instrumental and Control Failure Events Derivation and Analysis for Advanced Boiling Water Reactor Hui-Wen Huang, Wei-Yi Yang, Chunkuan Shih, Swu Yih, Yi-Bin Chen, Yen-Chang Tzeng, Cherng-Tsong Kuo, Chan-Fu Chuang, Ming-Huei Chen, Yuan-Chang Yu, Li-Hsin Wang, Hsun-Ho Wang, Chun-Yu Chen, and Wan-Tsz Tu A Fault Tolerant Optimization Algorithm Based on Evolutionary Computation Francisco Fernández de Vega Efficiency of Reliability Evaluation of LargeElectric Power Systems B. Kalinowski and George Anders Estimation of Impact of Maintenance Policies on Equipment Risk of Failure Henryk Maciejewski and George Anders Computer Modeling and Simulation of Discrete Transport System with Dispatcher for Reliability and Economic Analysis Jacek Mazurkiewicz and Tomasz Walkowiak Fuzzy Approach to Economic Analysis of Dispatcher Driven Discrete Transport systems Tomasz Walkowiak and Jacek Mazurkiewicz Conception of Composing Learning Content into Learning Tree to Ensure Reliability of Learning Material Marek Woda Author Index
Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation
Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,
More informationIEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003
IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical
More informationSixth IEEE International Symposium on High Assurance Systems Engineering
Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking 22-24 October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical
More informationProceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)
Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce
More information(DepCos-RELCOMEX 2009)
2009 4th International Conference on Dependability of Computer Systems (DepCos-RELCOMEX 2009) Brunow, Poland 30 June 2 July 2009 IEEE Catalog Number: ISBN: CFP0944A-PRT 978-1-4244-4322-2 2009 Fourth International
More informationCOMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)
PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS
More informationProceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003
Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003
More informationProceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002
Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i [blank page] ii Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 16-18 December
More informationSoftware Reliability Engineering
Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,
More informationFuture Trends of Distributed Computing Systems
Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationFuture Trends of Distributed Computing Systems
Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationDepCoS - RELCOMEX 2008
Institute of Computer Engineering, Control and Robotics Wroc³aw University of Technology with support from Moscow Power Engineering Institute (Technical University) Proceedings of International Conference
More information2017 International Conference on Communication Technologies (ComTech 2017)
2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute
More informationProceedings. Ninth International Conference on. Network Protocols ICNP 2001
Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored
More informationth International Conference on Telecommunications (ICT 2017)
2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical
More informationProceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
More informationProceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California
Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels
More informationProceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001
Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing 17-1 9 December
More informationReal-Time Optimization by Extremum-Seeking Control
Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley
More informationMulti-Core Programming
Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part
More informationAn object of research has changed System events System renewal Mathematical computer tools reliability dependability
Preface The conference DepCoS - RELCOMEX '06 is organized by the Institute of Computer Engineering, Control and Robotics (previously the Institute of Engineering Cybernetics), Wroclaw University of Technology.
More information2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)
2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationStudy Guide. Robert Schmidt Dane Charlton
Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More informationTask-level simulation of service based information systems
Task-level simulation of service based information systems Tomasz Walkowiak Wroclaw University of Technology, Poland tomasz.walkowiak@pwr.wroc.pl Maciej Woropay University of Technology and Life Sciences
More informationINTRUSION DETECTION AND CORRELATION. Challenges and Solutions
INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA
More informationCOMPONENT-ORIENTED PROGRAMMING
COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationTokyo. Copyright 2013 FUJITSU LIMITED
Shaping Tomorrow Through Modernization and Innovation Noriyuki Toyoki Corporate Senior Vice President Fujitsu Limited Tokyo Fujitsu Vision Human Centric Intelligent Society Fujitsu Technology and Service
More informationSecuring SCADA Systems. Ronald L. Krutz
Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Securing SCADA Systems Ronald L. Krutz Securing SCADA Systems Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis,
More information7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak
Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize
More information2. Firewall Management Tools used to monitor and control the Firewall Environment.
Firewall Review Section 1 FIREWALL MANAGEMENT & ADMINISTRATION Common management practices with regard to administering the (company) network should be in accordance with company policies and standards.
More informationProceedings of The Second International Conference on Web Information Systems Engineering
Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun
More informationToward Intrusion Tolerant Clouds
Toward Intrusion Tolerant Clouds Prof. Yair Amir, Prof. Vladimir Braverman Daniel Obenshain, Tom Tantillo Department of Computer Science Johns Hopkins University Prof. Cristina Nita-Rotaru, Prof. Jennifer
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationArchitecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788
Architecture-Based Self-Protecting Software Systems Adnan Alawneh CS 788 Outline Introduction - What is the problem? - What is the solution? - Motivating Example - How ABSP addresses these challenges?
More informationAn Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems
An Immune System Paradigm for the Assurance of Dependability of Collaborative Self-organizing Systems Algirdas Avižienis Vytautas Magnus University, Kaunas, Lithuania and University of California, Los
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationIntegration of information security and network data mining technology in the era of big data
Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationAnalysis on the application of on-chip redundancy in the safety-critical system
LETTER IEICE Electronics Express, Vol.11, No.9, 1 7 Analysis on the application of on-chip redundancy in the safety-critical system Bai-gen Cai 1, Cheng-ming Jin 1a), Lian-chuan Ma 1, Yuan Cao 1, and Hideo
More informationVPN Connection. VPN Gateway. 17 December 2002
VPN Connection to ZyXEL ZyWALL VPN Gateway 17 December 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to
More informationImplementing the NewHope-Simple Key Exchange on Low-Cost FPGAs
Implementing the NewHope-Simple Key Exchange on Low-Cost FPGAs Tobias Oder and Tim Güneysu Ruhr-University Bochum Latincrypt 2017 20.09.2017 Public-Key Crypto and Long-Term Security 2 Lattice-Based Cryptography
More informationAuthenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,
More informationThe Design and Implementation of Disaster Recovery in Dual-active Cloud Center
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang
More informationProceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems
PROCEEDINGS Proceedings of International Conference on Distributed Systems, Software Engineering, and Database Systems Copyright 1996 by National Sun Yat-Sen University All rights reserved. Abstracting
More informationAR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors
AR-SMT: A Microarchitectural Approach to Fault Tolerance in Microprocessors Computer Sciences Department University of Wisconsin Madison http://www.cs.wisc.edu/~ericro/ericro.html ericro@cs.wisc.edu High-Performance
More informationOverlay control methodology comparison: field-by-field and high-order methods
Overlay control methodology comparison: field-by-field and high-order methods Chun-Yen Huang a, Chui-Fu Chiu a, Wen-Bin Wu a, Chiang-Lin Shih a, Chin-Chou Kevin Huang* b, Healthy Huang c, DongSub Choi
More informationAnalysis on the Application of On-chip Redundancy in the Safety-critical System
This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. IEICE Electronics Express, Vol.* No.*,*-* Analysis on the Application of On-chip Redundancy
More informationWAN VPN Solutions. How Cisco Uses VPN Solutions to Extend the WAN. A Cisco on Cisco Case Study: Inside Cisco IT
WAN VPN Solutions How Cisco Uses VPN Solutions to Extend the WAN A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Finding cost-effective alternatives to dedicated circuits connecting remote
More informationThree Pillars of Effective Disaster Recovery
WHITE PAPER Three Pillars of Effective Disaster Recovery 1 WHITE PAPER Three Pillars of Effective Disaster Recovery: DRaaS + Networking + Managed Hosting Disaster Recovery is following the paths of other
More informationHASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More informationABOUT US SECURITY. A Legacy of Providing Solutions. Protecting Your Data
RnD Consulting LLC 957 Route 33 PMB 143 Hamilton Square, NJ 08690 Tel. (800) 949-8215 Fax. (609) 586-1712 mike@rndconsultingnj.com josh@rndconsultingnj.com ABOUT US A Legacy of Providing Solutions With
More informationHistorical Reliability Data for IEEE 3006 Standards: Power Systems Reliability
IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards
More informationSCADA virtual instruments management
Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 15 ( 2014 ) 1259 1264 Emerging Markets Queries in Finance and Business SCADA virtual instruments management Traian
More informationThe Internet of Things for Petroleum Transportation
2017 2nd International Conference on Applied Mechanics and Mechatronics Engineering (AMME 2017) ISBN: 978-1-60595-521-6 The Internet of Things for Petroleum Transportation Hui-ran WANG 1 and Rui-fang MA
More information2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN:
2017 International Conference on Economics, Management Engineering and Marketing (EMEM 2017) ISBN: 978-1-60595-502-5 Design of Attendance Check System Based on Ethernet Technology and Fingerprint Recognition
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationSeminar Software Quality and Safety
Seminar Software Quality and Safety SCADE a model-driven Software Development Environment by Dominik Protte Software Engineering Group Universität Paderborn Motivation Many safety-critical components in
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationThe Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI
2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing
More informationECBS Engineering of Computer-Based Systems. Novi Sad, Serbia April IEEE 19th International Conference and Workshops on
ECBS 2012 2012 IEEE 19th International Conference and Workshops on Engineering of Computer-Based Systems Conference Information Papers by Session Papers by Author Getting Started Search Trademarks Sponsored
More informationPhilip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition
FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7
More informationOutreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness
2011/EPWG/WKSP/020 Session 4 Outreach and Partnerships for Promoting and Facilitating Private Sector Emergency Preparedness Submitted by: Australia Workshop on Private Sector Emergency Preparedness Sendai,
More informationEncyclopedia of Information Science and Technology
Encyclopedia of Information Science and Technology Second Edition Mehdi Khosrow-Pour Information Resources Management Association, USA Volume IV G-Internet INFORMATION SCIENCE REFERENCE Hershey New York
More informationVPN Connection. 8 October 2002
VPN Connection to Cisco IOS Router 8 October 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to a private
More informationSuper-Peer Architectures for Distributed Computing
Whitepaper Super-Peer Architectures for Distributed Computing Fiorano Software, Inc. 718 University Avenue, Suite 212 Los Gatos, CA 95032 U.S.A. +1.408.354.3210 email info@fiorano.com www.fiorano.com Entire
More informationStudy on Computer Network Technology of Digital Library
International Symposium on Computers & Informatics (ISCI 2015) Study on Computer Network Technology of Digital Library Yanming Sui LinYi University, Linyi, China suiyanming@lyu.edu.cn Abstract With the
More informationRiverbed Granite Use Cases
WHITE PAPER Riverbed Granite Use Cases Riverbed Technical Marketing Purpose The following whitepaper outlines the use cases addressed by Riverbed Granite. Audience This whitepaper is intended for Riverbed
More informationUnit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15
Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure
More informationNetwork and Security infrastructure
Network and Security infrastructure Industry Day, Bologna, 16 January 2019 Ahmed Benallegue Networks and Security Workstream Leader Bologna January Bologna 16, 2019 January 16, 2019 Agenda Introduction
More informationSmart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability
Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,
More informationOverview. System architectures Software layers Architectural models. Design requirements. client-server, peer processes, mobile code, agents,...
Architectural Models Overview System architectures Software layers Architectural models client-server, peer processes, mobile code, agents,... Design requirements user expectations of the system 3 January,
More informationFault-tolerant in wireless sensor networks using fuzzy logic
International Research Journal of Applied and Basic Sciences 2014 Available online at www.irjabs.com ISSN 2251-838X / Vol, 8 (9): 1276-1282 Science Explorer Publications Fault-tolerant in wireless sensor
More informationClock Skew Based Client Device Identification in Cloud Environments
Clock Skew Based Client Device Identification in Cloud Environments Wei-Chung Teng Dept. of Computer Science & Info. Eng. National Taiwan University of Sci. & Tech. 1 Wei-Chung Teng on behalf of Assoc.
More informationCurriculum 2013 Knowledge Units Pertaining to PDC
Curriculum 2013 Knowledge Units Pertaining to C KA KU Tier Level NumC Learning Outcome Assembly level machine Describe how an instruction is executed in a classical von Neumann machine, with organization
More informationSOC 3 for Security and Availability
SOC 3 for Security and Availability Independent Practioner s Trust Services Report For the Period October 1, 2015 through September 30, 2016 Independent SOC 3 Report for the Security and Availability Trust
More informationStingray Traffic Manager 9.0
WHITE PAPER Stingray Traffic Manager 9.0 Network Deployment Options CONTENTS Introduction... 2 Stingray Aptimizer products... 2 Stingray Aptimizer for SharePoint and Windows IIS deployments... 2 Stingray
More informationA GPFS Primer October 2005
A Primer October 2005 Overview This paper describes (General Parallel File System) Version 2, Release 3 for AIX 5L and Linux. It provides an overview of key concepts which should be understood by those
More informationBeijing, China,
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,
More informationWhite paper PRIMEQUEST 1000 series high availability realized by Fujitsu s quality assurance
White paper PRIMEQUEST 1000 series high availability realized by Fujitsu s quality assurance PRIMEQUEST is an open enterprise server platform that fully maximizes uptime. This whitepaper explains how Fujitsu
More informationData Warehousing and Data Mining Techniques for Cyber Security
Data Warehousing and Data Mining Techniques for Cyber Security Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA
More informationProcess Valve Networking 101: What, Why and How Much?
Process Valve Networking 101: What, Why and How Much? Manufacturers have quickly come to realize that the only way to see a return on investment is to optimize enterprise and plant operations at every
More informationDigital Humanities Digital Economics. Digital Arts. 05. One elective course from the courses offered at the university faculties
Table 1. First study cycle 1 Year 1 semester 01. 10.9.AITMIR.1101.C е-democracy 02. 04.0.AITMIR.1102.C е-management 03. 08.9.AITMIR.1103.C е-ethics 04. One elective course from the following list 1. 08.0.AITMIR.1104.MaE
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationRiccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist
Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Internet of Things Group 2 Internet of Things Group 3 Autonomous systems: computing platform Intelligent eyes Vision. Intelligent
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationSoftware Verification and Validation (VIMMD052) Introduction. Istvan Majzik Budapest University of Technology and Economics
Software Verification and Validation (VIMMD052) Introduction Istvan Majzik majzik@mit.bme.hu Budapest University of Technology and Economics Dept. of Measurement and Information s Budapest University of
More informationWhite paper June ARINC RailwayNet HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION
White paper June 2016 ARINC RailwayNet SM HOSTED POSITIVE TRAIN CONTROL (PTC) COMMUNICATION SOLUTION Background Improving rail safety The National Transportation Safety Board (NTSB) has attributed a number
More informationThe Design and Implementation of a Low-Latency On-Chip Network
The Design and Implementation of a Low-Latency On-Chip Network Robert Mullins 11 th Asia and South Pacific Design Automation Conference (ASP-DAC), Jan 24-27 th, 2006, Yokohama, Japan. Introduction Current
More informationRelational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers
More informationLinux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,
More informationBlock Sparse and Addressing for Memory BIST Application
Block Sparse and Addressing for Memory BIST Application Mohammed Altaf Ahmed 1, D Elizabath Rani 2 and Syed Abdul Sattar 3 1 Dept. of Electronics & Communication Engineering, GITAM Institute of Technology,
More informationKuan-Wen Chen SUMMARY RESEARCH INTERESTS EDUCATION #31648
Kuan-Wen Chen Assistant Professor Department of Computer Science National Chiao Tung University Hsinchu, Taiwan +886-3-5712121#31648 kuanwen@cs.nctu.edu.tw SUMMARY Expertise in computer vision, pattern
More informationDistribution Transparencies For Integrated Systems*
Distribution Transparencies For Integrated Systems* Janis Putman, The Corporation Ground System Architectures Workshop 2000 The Aerospace Corporation February 2000 Organization: D500 1 * The views and
More informationA NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE
Online Journal, www.ijcea.com A NEW WATERMARKING TECHNIQUE FOR SECURE DATABASE Jun Ziang Pinn 1 and A. Fr. Zung 2 1,2 P. S. University for Technology, Harbin 150001, P. R. China ABSTRACT Digital multimedia
More informationJoin the p2p.wrox.com. Wrox Programmer to Programmer. Beginning PHP 5.3. Matt Doyle
Join the discussion @ p2p.wrox.com Wrox Programmer to Programmer Beginning PHP 5.3 Matt Doyle Programmer to Programmer Get more out of WROX.com Interact Take an active role online by participating in our
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More information