Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001

Size: px
Start display at page:

Download "Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001"

Transcription

1 Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001

2 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing December 2001 Seoul, Korea Sponsored by IEEE Computer Society Technical Committee on Fault-Tolerant Computing Sungkyunkwan University, Korea Korean Information Processing Society ETRl (Electronics and Telecommunications Research Institute) KSll (Korean Society for Internet Information) In cooperation with IFIP WG10.4 on Dependable Computing and Fault Tolerance SOCIETY IEEE Los Alamitos, California Washington Brussels Tokyo

3 Copyright by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number PRO1414 ISBN Library of Congress Number Additional copies may be ordered from: IEEE Computer Society Customer Service Center Los Vaqueros Circle P.O. Box 3014 LOS Alamitos, CA Tel: Fax: computer.org IEEE Service Center 445 Hoes Lane P.O. Box 1331 Piscataway, NJ Tel: Fax: customer-service@ieee.org IEEE Computer Society AsialPacific Office Watanabe Bldg., Minami- Aoyama Minato-ku, Tokyo JAPAN Tel: Fax: tokyo.ofc@computer.org Editorial production by A. Denise Williams Cover art production by Joseph DaigleIStudio Productions Printed in the United States of America by The Printing House SOCIETY

4 Table of Contents 2001 Pacific Rim International Symposium on Dependable Computing Chairs' Message... x Organizing Committee... xi Steering Committee... xii... Program Committee... XIII Reviewers... xiv Keynote Speech I Middleware of Real-Time Object Based Fault-Tolerant Distributed Computing Systems: Issues and Some Approaches... 3 K.H. Kim, University of California at Irvine, USA Session 1 A Fault Tolerant Hardwares I Chair: Myungchul Kim, Information and Communications Univ., Korea Novel Fault-Tolerant Techniques for High Capacity RAMS C-H. Hsu, S-K. Lu, and S-Y. Kuo Connectivity-Based Multichip Module Repair M. Choi, N. Park, F. Meyer, and F. Lombardi SSD: An Affordable Fault Tolerant Architecture for Superscalar Processors S.Kim and A. K. Somani A Design-Diversity Based Fault-Tolerant COTS Avionics Bus Network S.N. Chau, J. Smith, and A.T. Tai Session 16: Checkpointing Chair: Dongman Lee, Information and Communications Univ., Korea On the Choice of Checkpoint Interval Using Memory Usage Profile and Adaptive Time Series Analysis J. Hong, S. Kim, Y. Cho, H. Y. Yeom, and T. Park A Secure Checkpointing System H-C. Nam, J. Kim, S.J. Hong, and S. Lee Optimal Checkpoint Interval Analysis Using Stochastic Petri Net G-L. Park, H.Y. Youn, and H. Choo Session 2A: Dependability Evaluation Chair: Sunggu Lee, Pohang University of Science and Technology, Korea Dependability Analysis of a Fault-Tolerant Processor C. Constantinescu Modeling the Dependability of N-Modular Redundancy on Demand under Malicious Agreement F. Lombardi, N. Park, M. Al-Hashimi, and H.H. Pu OpenSESAME: An Intuitive Dependability Modeling Environment Supporting Inter-Component Dependencies M. Walter, C. Trinitis, and W. Karl V

5 Session 2B: Software Fault Tolerance Chair: Bella Bose, Oregon State University, USA Optimal Software Rejuvenation Policy with Discounting T. Dohi, T. Danjou, and H. Okamura Automatic Verification of Fault Tolerance Using Model Checking T. Yokogawa, T. Tsuchiya, and T. Kikuno Analysis of Periodic Preventive Maintenance with General System Failure Distribution D. Chen and K.S. Trivedi Session 3A: Networking Issues I Chair: Hyuk Jae Lee, Seoul National University, Korea Fault-Tolerant Routing in Two-Dimensional Mesh Networks with Less-Restricted Fault Patterns S-D. Wang and P-H. Sui Availability Considerations in Network Design J.P. Sauve' and F.E.S. Coelho Escape and Restoration Routing: Suspensive Deadlock Recovery in Interconnection Networks T. Takabatake, M. Kitakami, and H. It0 Session 39: Distributed Systems Chair: Chang-Sung Jeong, Korea University, Korea Impact of a Failure Detection Mechanism on the Performance of Consensus N. Sergent, X. Dbfago, and A. Schiper An Adaptive Failure Detection Protocol C. Fetzer, M. Raynal, and F. Tronel Rejuvenation and Failure Detection in Partitionable Systems C. Fetzer and K. Hogstedt Keynote Speech II Implications of Dependable Computing in Banking Industry S.S. Pyo, Woori Financial Information System, Korea Session 4A: Fault Tolerant Hardwares II Chair: Sungje Hong, Pohang University of Science and Technology, Korea Automatic Reconfiguration of an Autonomous Disk Cluster D. It0 and H. Yokota Partial Order Reduction in Verification of Wheel Structured Parameterized Circuits T. Kitai and T. Yoneda ECC: Extended Condition Coverage for Design Verification Using Excitation and Observation B. Min and G. Choi Development of a Fail-safe Microprocessor LSI with Self-Diagnosis Mechanism Depending on an M-Sequence Code Signature S. Takahashi, M. Taira, H. Saegusa, T. Hoshino, and H. Nakamura vi

6 Session 48: Mobile Systems Chair: Keecheon Kim, Konkuk University, Korea Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks C-H. Chuan and S-Y. Kuo An Adaptive Routing Protocol Supporting Reliable Communication in Wireless Ad-Hoc Network Environments M.J. Kim and Y.1. Eom Enhanced Token Delivery Scheme for Reliable Multicasting in Wireless Networks J. Y. Lim and T. M. Chung Ticket Based Authentication and Payment Protocol for Mobile Telecommunications Systems B-R. Lee, T-Y. Kim, and S-S. Kang Session 5A: Fault Tolerant Microprocessors Chair: Nohpill Park, Oklahoma State University, USA Evaluating Low-Cost Fault-Tolerance Mechanism for Microprocessors on Multimedia Applications T. Sato and I. Arita Analytical Results for Reconfiguration of E-1%- Track Switch Torus Arrays with Multiple Fault Types T. Horita and I. Takanami A Generic Availability Model for Clustered Computing Systems H. Sun, J. J. Han, and H. Levendel Session 5B: Networking Issues II Chair: Wonjun Lee, Ewha Women's University, Korea ARQ in Optical Networks P. Oprisan and B. Bose Analysis of Using Convolutional Codes to Recover Packet Losses over Burst Erasure Channels M. Arai, A. Yamamoto, A. Yamaguchi, S. Fukurnoto, and K. Iwasaki Secure Access to Personalized Web Services G. B. Barone, N. Margarita, A. Maueo, N. Mauocca, and L. Romano Session 6A: CORBA and Group Communication Chair: Sunyoung Han, Konkuk University, Korea Failure Detection Mechanism for Distributed Object Computing Using CORBA W-C. Su, S-C. Wang, and S-Y. Kuo The Implementation and Analysis of OCI-Based Group Communication Support in CORBA D. Lee, D. Nam, H.Y. Youn, and C. Yu Ticket-Based Secure Delegation Service Supporting Multiple Domain Models K-A. Chang, T-S. Lee, B-H. Chun, and T-Y. Kim vii

7 Session 6B: Fault Tolerant Applications I Chair: Jong Kim, Pohang University of Science and Technology, Korea A Study on the System Call for the Protection of Intellectual Property Rights on Linux Base H. Kim and D-J. Hwang Extended BLP Security Model Based on Process Reliability for Secure Linux Kernel J-M. Kang, W. Shin, C-G. Park, and D-I. Lee Real-Time Fingerprints Recognition Mechanism-Based on Digital Contents Protection System for Interaction on Web Y-K. Kang and M-H. Kim Session 7A: Reliable Software Systems Chair: Inhwan Lee, Hanyang University, Korea A Case Study: Validation of Guidance Control Software Requirements for Completeness, Consistency and Fault Tolerance F.T. Sheldon, H.Y. Kim, and Z Zhou Fault-Tolerance of Functional Programs Based on the Parallel Graph Reduction M. Kitakami, S. Kubota, and H. It0 Session 78: Fault Tolerant Applications II Chair: Arun Somani, Iowa State University, USA TREG: Transactional Services Based on Incremental Messages C. Pe'rez, G. Fabregat, J. J. Villaplana, and R. J. Martinez Approximation Method for Probability Distribution Functions Using Cox Distribution to Evaluate Multimedia Systems Y. Sasaki, H. lmai, M. Tsunoyama, and I. lshii Dependable Automatic Train Control System Using Digital Track Signals M. Matsumoto, T. Tsurumaki, T. Shigeta, K. Tashiro, and D. Watanabe Session 8A: Real-Time Systems Chair: Tomohiro Yoneda, Tokyo Institute of Technology, Japan Validating Real-Time Constraints in Embedded Systems R.K. Shyamasundar and J.V. Aghav Table Driven Proportional Access Based Real-Time Ethernet for Safety-Critical Real-Time Systems D. Kim, Y. Doh, and Y-H. Lee Intelligent Fault-Tolerant CORBA Service on Real-Time CORBA Y. Kim, S. Hong, K. Park, K. Kim, and S. Han Session 9A: Availability Analysis Chair: Frederic T. Sheldon, Washington State University, USA Instantaneous Availability and Interval Availability for Systems with Time-Varying Failure Rate: Stair-Step Approximation H. Sun and J. J. Han viii

8 Safety Analysis by Box Modeling Method of System Behavior-Application Train Control System S. Hiraguri, N. Nishibori, Y. Hidaka, T. Kasai, and H. Nakamura Safety Analysis Using Temporal Database H. Kobayashi Author Index to ix

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002

Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002 Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i [blank page] ii Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 16-18 December

More information

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation

Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,

More information

Sixth IEEE International Symposium on High Assurance Systems Engineering

Sixth IEEE International Symposium on High Assurance Systems Engineering Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking 22-24 October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical

More information

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003

IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical

More information

Software Reliability Engineering

Software Reliability Engineering Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,

More information

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)

COMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)

Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce

More information

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003

Proceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003

More information

Future Trends of Distributed Computing Systems

Future Trends of Distributed Computing Systems Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington

More information

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001

Proceedings. Ninth International Conference on. Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored

More information

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

Proceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing

More information

Multi-Core Programming

Multi-Core Programming Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part

More information

2017 International Conference on Communication Technologies (ComTech 2017)

2017 International Conference on Communication Technologies (ComTech 2017) 2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute

More information

th International Conference on Telecommunications (ICT 2017)

th International Conference on Telecommunications (ICT 2017) 2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical

More information

WIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Proceedings of The Second International Conference on Web Information Systems Engineering

Proceedings of The Second International Conference on Web Information Systems Engineering Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun

More information

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)

2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) 2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright

More information

Algorithms and Parallel Computing

Algorithms and Parallel Computing Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Jong-Hoon Youn Bella Bose Seungjin Park Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science Oregon State University

More information

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California

Proceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels

More information

Implementing Security and Tokens: Current Standards, Tools, and Practices

Implementing  Security and Tokens: Current Standards, Tools, and Practices Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

MODERN MULTITHREADING

MODERN MULTITHREADING MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING

More information

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.

DISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON. DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS

More information

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS

LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS

More information

Practical Database Programming with Visual Basic.NET

Practical Database Programming with Visual Basic.NET Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson

More information

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability

Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards

More information

COMPONENT-ORIENTED PROGRAMMING

COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John

More information

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler

Agile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques

More information

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak

7 Windows Tweaks. A Comprehensive Guide to Customizing, Increasing Performance, and Securing Microsoft Windows 7. Steve Sinchak Take control of Windows 7 Unlock hidden settings Rev up your network Disable features you hate, for good Fine-tune User Account control Turbocharge online speed Master the taskbar and start button Customize

More information

Linux Command Line and Shell Scripting Bible

Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,

More information

A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop

A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop Myoungjin Kim 1, Seungho Han 1, Jongjin Jung 3, Hanku Lee 1,2,*, Okkyung Choi 2 1 Department of Internet and Multimedia Engineering,

More information

An Enhanced Security Policy Framework for Android

An Enhanced Security Policy Framework for Android All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to

More information

An Area-Efficient BIRA With 1-D Spare Segments

An Area-Efficient BIRA With 1-D Spare Segments 206 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 26, NO. 1, JANUARY 2018 An Area-Efficient BIRA With 1-D Spare Segments Donghyun Kim, Hayoung Lee, and Sungho Kang Abstract The

More information

Collaboration System using Agent based on MRA in Cloud

Collaboration System using Agent based on MRA in Cloud Collaboration System using Agent based on MRA in Cloud Jong-Sub Lee*, Seok-Jae Moon** *Department of Information & Communication System, Semyeong University, Jecheon, Korea. ** Ingenium college of liberal

More information

COSO Enterprise Risk Management

COSO Enterprise Risk Management COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,

More information

Fault-Tolerant Parallel and Distributed Systems

Fault-Tolerant Parallel and Distributed Systems Fault-Tolerant Parallel and Distributed Systems Fault-Tolerant Parallel and Distributed Systems by DIMITER R. AVRESKY Department of Electrical and Computer Engineering Boston University Boston, MA and

More information

SYLLABUS. Departmental Syllabus

SYLLABUS. Departmental Syllabus SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0801 SEMESTER: COURSE TITLE: Networking I COURSE NUMBER: CIST- 0117 CREDIT HOURS: 3 INSTRUCTOR: OFFICE LOCATION: OFFICE HOURS: TELEPHONE: EMAIL: PREREQUISITE(S):

More information

Microprocessor Theory

Microprocessor Theory Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A

More information

Relational Database Index Design and the Optimizers

Relational Database Index Design and the Optimizers Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers

More information

Home Inspection 2014

Home Inspection 2014 Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section

More information

Restricting Unauthorized Access Using Biometrics In Mobile

Restricting Unauthorized Access Using Biometrics In Mobile Restricting Unauthorized Access Using Biometrics In Mobile S.Vignesh*, M.Narayanan# Under Graduate student*, Assistant Professor# Department Of Computer Science and Engineering, Saveetha School Of Engineering

More information

Development of Distributed Programming Developing Tool-Kit Based on Object Group Model

Development of Distributed Programming Developing Tool-Kit Based on Object Group Model Development of Distributed Programming Developing Tool-Kit Based on Object Group Model Jeong-Taek Lim, Su-Chong Joo School of Electrical, Electronic and Information Engineering, Wonkwang University, Korea

More information

Netwoking Essentials

Netwoking Essentials Mark Sportack Walter J. Glenn Sams' Teach Yourself MCSE Netwoking Essentials SAMS PUBLISHING IN 14 DAYS Sams Publishing is an independant entity from Microsoft Corporation, and not affiliated with Microsoft

More information

Designing Security Architecture Solutions Jay Ramachandran Wiley Computer Publishing John Wiley & Sons, Inc. Designing Security Architecture Solutions Designing Security Architecture Solutions Jay Ramachandran

More information

Car Information Systems for ITS

Car Information Systems for ITS Car Information Systems for ITS 102 Car Information Systems for ITS Kozo Nakamura Ichiro Hondo Nobuo Hataoka, Ph.D. Shiro Horii OVERVIEW: For ITS (intelligent transport systems) car information systems,

More information

Mastering UNIX Shell Scripting

Mastering UNIX Shell Scripting Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell

More information

Cost Effective Acknowledgement Mechanism for Underwater Acoustic Sensor Network

Cost Effective Acknowledgement Mechanism for Underwater Acoustic Sensor Network Cost Effective Acknowledgement Mechanism for Underwater Acoustic Sensor Network Soo Young Shin and Soo Hyun Park Graduate School of BIT, Kookmin University, Seoul, Korea sy-shin@kookmin.ac.kr, shpark21@kookmin.ac.kr

More information

ICACT2011 Status Report

ICACT2011 Status Report Smart Service Innovation through Mobile Interactivity The 13 th International Conference on Advanced Communication Technology ICACT2011 Status Report February 2011 ICACT2011 Secretariat http://www.icact.org

More information

Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices

Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Ilhoon Shin Seoul National University of Science & Technology ilhoon.shin@snut.ac.kr Abstract As the amount of digitized

More information

Space-Efficient Page-Level Incremental Checkpointing *

Space-Efficient Page-Level Incremental Checkpointing * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 237-246 (2006) Space-Efficient Page-Level Incremental Checkpointing * JUNYOUNG HEO, SANGHO YI, YOOKUN CHO AND JIMAN HONG + School of Computer Science

More information

Applicability Estimation of Mobile Mapping. System for Road Management

Applicability Estimation of Mobile Mapping. System for Road Management Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1407-1414 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49173 Applicability Estimation of Mobile Mapping System for Road Management

More information

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING

THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive

More information

Minutes of Meeting (Draft)

Minutes of Meeting (Draft) Minutes of Meeting (Draft) The 2 nd CJK Standards Information Exchange Meeting 7 November, 2002, Tokyo, Japan The 2 nd CJK (China-Japan-Korea) Standards Information Exchange Meeting, hosted by /TTC, was

More information

Real-Time Optimization by Extremum-Seeking Control

Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley

More information

BioPassport TM Enterprise Server

BioPassport TM Enterprise Server BioPassport TM Enterprise Server The BioPassport Enterprise AD Server is the intelligence behind all of IdentAlink s biometric modules. Password management for a network or application can cost hundreds

More information

Development of an Optimization Software System for Nonlinear Dynamics using the Equivalent Static Loads Method

Development of an Optimization Software System for Nonlinear Dynamics using the Equivalent Static Loads Method 10 th World Congress on Structural and Multidisciplinary Optimization May 19-24, 2013, Orlando, Florida, USA Development of an Optimization Software System for Nonlinear Dynamics using the Equivalent Static

More information

User-based secure digital content durability service support OSMU

User-based secure digital content durability service support OSMU User-based secure digital content durability service support OSMU DaeHee Seo 1, MiYeon Yoon 2, DongSub Cho 3, KabSeung Kou 4 Jang-Mi Baek 5 1 Electronics and Telecommunications Research Institute 2 Korea

More information

VPN Connection. 8 October 2002

VPN Connection. 8 October 2002 VPN Connection to Cisco IOS Router 8 October 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to a private

More information

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks

Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE e networks Improving the quality of H.264 video transmission using the Intra-Frame FEC over IEEE 802.11e networks Seung-Seok Kang 1,1, Yejin Sohn 1, and Eunji Moon 1 1Department of Computer Science, Seoul Women s

More information

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H

IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO

More information

Publications. ACH Audit Requirements. A new approach to payments advising SM. Sound Practices Checklists

Publications. ACH Audit Requirements. A new approach to payments advising SM. Sound Practices Checklists Publications ACH Audit Requirements Sound Practices Checklists Price: $150 Member Discounted Price: $75 (489) Revised: 02/2019 A new approach to payments advising SM Purpose of this Document WesPay Advisors

More information

Dukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS

Dukpa Kim FIELDS OF INTEREST. Econometrics, Time Series Econometrics ACADEMIC POSITIONS Dukpa Kim Contact Information Department of Economics Phone: 82-2-3290-5131 Korea University Fax: 82-2-3290-2661 145 Anam-ro, Seongbuk-gu Email: dukpakim@korea.ac.kr Seoul, 02841 Korea FIELDS OF INTEREST

More information

Introduction to Computer Networking

Introduction to Computer Networking Introduction to Computer Networking Thomas G. Robertazzi Introduction to Computer Networking 123 Thomas G. Robertazzi Department of Electrical and Computer Engineering Stony Brook University Stony Brook,

More information

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle Application of isight for Optimal Tip Design of Complex Tool Holder Spindle WMSCI 2010 Author: Koo Hong Kwon Won Jee Chung Ki Beom Park School of Mechatronics, Changwon National University Email: goodgoohong@hanmail.net

More information

Joint Statement of the Eminent Persons Group for the 2012 Seoul Nuclear Security Summit

Joint Statement of the Eminent Persons Group for the 2012 Seoul Nuclear Security Summit Joint Statement of the Eminent Persons Group for the 2012 Seoul Nuclear Security Summit We, members of the Eminent Persons Group established to advise the President of the, Lee Myung-bak, on the 2012 Seoul

More information

Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018

Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018 Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018 Overview POSITION STATEMENTS Position Statements Purpose To document and analyze policy and/or standardized surveillance

More information

Concrete Abstractions

Concrete Abstractions Concrete Abstractions Concrete Abstractions An Introduction to Computer Science Using Scheme Max Hailperin Gustavus Adolphus College Barbara Kaiser Gustavus Adolphus College Karl Knight Gustavus Adolphus

More information

DSRC Standards Development in ITU-R and Japan

DSRC Standards Development in ITU-R and Japan DSRC Standards Development in ITU-R and Japan SS30: Future ITS Wireless Communications November 10, 2005 San Francisco, U.S.A. Sam Oyama (Hitachi, Ltd.) ITS Info-Communications Forum, Japan November 10,

More information

Node-level Fault Tolerance for Fixed Priority Scheduling. Project proposal submitted to ARTES

Node-level Fault Tolerance for Fixed Priority Scheduling. Project proposal submitted to ARTES Chalmers University of Technology Department of Computer Engineering 412 96 Göteborg 1998-11-13 Node-level Fault Tolerance for Fixed Priority Scheduling Project proposal submitted to ARTES Johan Karlsson

More information

Parallel and Distributed Systems. Programming Models. Why Parallel or Distributed Computing? What is a parallel computer?

Parallel and Distributed Systems. Programming Models. Why Parallel or Distributed Computing? What is a parallel computer? Parallel and Distributed Systems Instructor: Sandhya Dwarkadas Department of Computer Science University of Rochester What is a parallel computer? A collection of processing elements that communicate and

More information

APPLICATION BASED MOBILE BANKING USER GUIDE

APPLICATION BASED MOBILE BANKING USER GUIDE APPLICATION BASED MOBILE BANKING USER GUIDE United Bank of India Alternate Delivery Channel United mbank - Mobile Banking service OBJECTIVE: This user guide is aimed to acquaint the customer in registering,

More information

Service Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction

Service Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction Service Level Agreement for Microsoft Azure operated by 21Vianet Last updated: November 2017 1. Introduction This Service Level Agreement for Azure (this SLA ) is made by 21Vianet in connection with, and

More information

LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine

LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine 777 LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine Hak-Su Lim and Jin-Soo Kim *College of Info. & Comm. Engineering, Sungkyunkwan University, Korea {haksu.lim,

More information

(Ordinance of the Ministry of Posts and Telecommunications No. 64-November 16,

(Ordinance of the Ministry of Posts and Telecommunications No. 64-November 16, This English translation of the Civil Code has been prepared (up to the revisions of Act No. 80 of 2008 (These Rules shall come into effect as from the date of promulgation. (Some provisions shall come

More information

Security-Enriched Urban Computing and Smart Grid

Security-Enriched Urban Computing and Smart Grid Tai-hoon Kim Adrian Stoica Ruay-Shiung Chang (Eds.) Security-Enriched Urban Computing and Smart Grid First International Conference, SUComS 2010 Daejeon, Korea, September 15-17, 2010 Proceedings 13 Volume

More information

HUTCHISON GLOBAL COMMUNICATIONS LIMITED IBIZCLOUD SERVICE SERVICE LEVEL AGREEMENT (SLA)

HUTCHISON GLOBAL COMMUNICATIONS LIMITED IBIZCLOUD SERVICE SERVICE LEVEL AGREEMENT (SLA) HUTCHISON GLOBAL COMMUNICATIONS LIMITED IBIZCLOUD SERVICE SERVICE LEVEL AGREEMENT (SLA) This SERVICE LEVEL AGREEMENT (SLA) is entered into between Hutchison Global Communications Limited (HGC) and (Customer)

More information

VPN Connection. VPN Gateway. 17 December 2002

VPN Connection. VPN Gateway. 17 December 2002 VPN Connection to ZyXEL ZyWALL VPN Gateway 17 December 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to

More information

Secure User Authentication Mechanism in Digital Home Network Environments

Secure User Authentication Mechanism in Digital Home Network Environments Secure User Authentication Mechanism in Digital Home Network Environments Jongpil Jeong, Min Young Chung, and Hyunseung Choo Intelligent HCI Convergence Research Center Sungkyunkwan University 440-746,

More information

Development of middleware applicable to various types of system structure in train-traffic-control systems

Development of middleware applicable to various types of system structure in train-traffic-control systems Development of middleware applicable to various types of system structure in train-traffic-control systems Y. Kakumoto 1, E. Nisijima 1, H. Suizu 2, & N. Komoda 3 1 Systems Development Laboratory, Hitachi

More information

The architecture of a web service-based remote control service system

The architecture of a web service-based remote control service system Loughborough University Institutional Repository The architecture of a web service-based remote control service system This item was submitted to Loughborough University's Institutional Repository by the/an

More information

TOURISM REGULATORY AUTHORITY VACANCIES

TOURISM REGULATORY AUTHORITY VACANCIES TOURISM REGULATORY AUTHORITY VACANCIES Tourism Regulatory Authority (TRA) is a state corporation established under Tourism Act No. 28 of 2011 to regulate, manage and provide strategic direction to the

More information

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING

DOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the

More information

Module 4: Stochastic Activity Networks

Module 4: Stochastic Activity Networks Module 4: Stochastic Activity Networks Module 4, Slide 1 Stochastic Petri nets Session Outline Places, tokens, input / output arcs, transitions Readers / Writers example Stochastic activity networks Input

More information

Part 16: Air Interface for Fixed Broadband Wireless Access Systems

Part 16: Air Interface for Fixed Broadband Wireless Access Systems Draft IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Amendment for Improved Coexistence Mechanisms for License-Exempt Operation

More information

Modern Experimental Design

Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.

More information

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks

Telematics Transport Gateway for Telematics Systems. Independent on Mobile Networks Telematics Transport Gateway for Telematics Systems Independent on Mobile Networks Chul-Su Kim 1 *, Jongik Kim, Woo-Yong Han, and Oh-Cheon Kwon 1. Electronics and Telecommunications Research Institute,

More information

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications

Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Gregory Nyberg Robert Patrick Paul Bauerschmidt Jeffrey McDaniel Raja Mukherjee Mastering BEA WebLogic Server

More information

Voltage Measurement Accuracy Assessment System for Distribution Equipment of Smart Distribution Network

Voltage Measurement Accuracy Assessment System for Distribution Equipment of Smart Distribution Network J Electr Eng Technol.2015; 10(3): 1328-1334 http://dx.doi.org/10.5370/jeet.2015.10.3.1328 ISSN(Print) 1975-0102 ISSN(Online) 2093-7423 Voltage Measurement Accuracy Assessment System for Distribution Equipment

More information

The Message Scheduling Methods of FlexRay Communication Network Based on the Clustering Methods

The Message Scheduling Methods of FlexRay Communication Network Based on the Clustering Methods The Message Scheduling Methods of FlexRay Communication Network Based on the Methods Yung-Hoh Sheu, Yao-Jhong Liou, and Zuo-Wen Wang Abstract In recent years, standards for vehicle safety have continued

More information

Optical Storage Technology Association. Optical Disk Archive Test Committee (ODAT)

Optical Storage Technology Association. Optical Disk Archive Test Committee (ODAT) Optical Storage Technology Association Optical Disk Archive Test Committee () Optical Storage Symposium 2006 Co-hosted with CDs21 Akihabara Convention Center Oct 5 th, 2006 Tokyo, Japan chris.smith@am.sony.com

More information

ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors

ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors Milos Prvulovic, Zheng Zhang*, Josep Torrellas University of Illinois at Urbana-Champaign *Hewlett-Packard

More information

Automated and Massive-scale CCNx Experiments with Software-Defined SmartX Boxes

Automated and Massive-scale CCNx Experiments with Software-Defined SmartX Boxes Network Research Workshop Proceedings of the Asia-Pacific Advanced Network 2014 v. 38, p. 29-33. http://dx.doi.org/10.7125/apan.38.5 ISSN 2227-3026 Automated and Massive-scale CCNx Experiments with Software-Defined

More information

IPv6 Deployment Status in Japan

IPv6 Deployment Status in Japan IPv6 Deployment Status in Japan IPv6 Promotion Council Tomy Issa 2005/5/26 IPv6 Promotion Council of Japan 1 Agenda Overview of e-japan (2001 2005) A glimpse of u-japan (2006-2010) A sample of vendors

More information

Study Guide. Robert Schmidt Dane Charlton

Study Guide. Robert Schmidt Dane Charlton Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine

More information

Personal Data & Privacy Policy Statement

Personal Data & Privacy Policy Statement Personal Data & Privacy Policy Statement Your Privacy Hong Kong Broadband Network Limited ("we" or the "Company") respect the privacy rights of visitors to all our company websites (the Websites ) and

More information

CONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1

CONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1 CONTENTS Preface xvii Document Revision History xvii Audience xvii Objective xviii Document Organization xviii Document Conventions xix Related Publications xx Obtaining Documentation and Submitting a

More information