Achieving Security Assurance with Assertion-based Application Construction

Size: px
Start display at page:

Download "Achieving Security Assurance with Assertion-based Application Construction"

Transcription

1 Achieving Securiy Assurance wih Asserion-based Applicaion Consrucion Carlos E. Rubio-Medrano and Gail-Joon Ahn Ira A. Fulon Schools of Engineering Arizona Sae Universiy Tempe, Arizona, USA, {crubiome, Karsen Sohr Cener for Compuing Technologies (TZI) Universiä Bremen Bremen, Germany Absrac Modern sofware applicaions are commonly buil by leveraging pre-fabricaed modules, e.g. applicaion programming inerfaces (APIs), which are essenial o implemen he desired funcionaliies of sofware applicaions, helping reduce he overall developmen coss and ime. When APIs deal wih securiy-relaed funcionaliy, i is criical o ensure hey comply wih heir design requiremens since oherwise unexpeced flaws and vulnerabiliies may be consequenly occurred. Ofen, such APIs may lack sufficien specificaion deails, or may implemen a semanically-differen version of a desired securiy model o enforce, hus possibly complicaing he runime enforcemen of securiy properies and making i harder o minimize he exisence of serious vulnerabiliies. This paper proposes a novel approach o address such a criical challenge by leveraging he noion of sofware asserions. We focus on securiy requiremens in rolebased access conrol models and show how proper verificaion a he source-code level can be performed wih our proposed approach as well as wih auomaed sae-of-he-ar asserionbased echniques. I. INTRODUCTION In recen years, here has been an increasing ineres in leveraging heerogeneous pre-fabricaed sofware modules, e.g. applicaion programming inerfaces (APIs) and sofware developmen kis (SDKs), in order o no only reduce he overall developmen coss and ime in producing high-qualiy applicaions, bu also minimize he number of incorrec behaviors (bugs) observed in he final produc. However, recen lieraure has shown ha such modules ofen lack he proper specificaion deails (in he form of formal or informal specificaion) ha are essenial o guide how a given module can be used correcly for implemening securiy-relaed funcionaliy [1] [2]. Such a problem may poenially become he source of serious securiy vulnerabiliies, as developers may no be fully aware of he omissions and flaws hey may inroduce ino heir applicaions by failing o implemen a securiy model in a proper way. In order o solve his problem, we propose an asserion-based approach o capure securiy requiremens of securiy models and creae well-defined represenaions of hose requiremens. This way, he securiy feaures could be effecively undersood by all paricipans in he sofware developmen process so ha hey can leverage hese feaures when implemening securiy-relaed funcionaliies for muli-module applicaions while being engaged in a highly-collaboraive environmen a he same ime. These asserion-based securiy specificaions would be used in conjuncion wih exising saeof-he-ar mehodologies and ools o verify securiy properies a he source-code level. In his paper, we choose he wellknown role-based access conrol (RBAC) [3] as securiy model o enforce access conrol requiremens over an applicaion ha is in urn composed of several heerogeneous modules. Also, we uilize exising ools o verify a se of securiy properies, hus providing a way o locae and possibly correc poenial securiy vulnerabiliies in sofware applicaions. This paper is organized as follows: we sar by providing some background in Secion II. Nex, we examine he general problem, as well as he problem insance discussed in his paper in Secion III. We hen presen our approach in Secion IV, and a case sudy depicing hree Java-based sofware applicaions and an experimenal process in Secion V. In Secion VI, we provide some discussion on he benefis and observed shorcomings of our approach as well as some relaed work. Finally, Secion VII presens direcives for our fuure work and concludes he paper. II. BACKGROUND Sofware asserions are commonly described as formal consrains inended o describe wha a sofware sysem is expeced o do a runime, and are commonly wrien as annoaions in he sysem s source code [4]. Using asserions, developers can specify wha condiions are expeced o be valid before and afer a cerain porion of code ges execued, e.g. he expeced range of values inended for he parameer of a given funcion. Design by conrac (DBC) [5] is a sofware developmen mehodology based on asserions and he assumpion ha he developers and he prospecive users (cliens) of a given sofware module esablish a conrac beween each oher in order for he module o be used correcly. Commonly, such a conrac is defined in erms of asserions in he form of pre and pos condiions, among oher relaed consrucs. Before using a DBC-based sofware module M, cliens mus make sure ha M s precondiions hold. In a similar fashion, developers mus guaranee ha M s poscondiions hold once i has finished execuion, assuming is corresponding precondiions were saisfied beforehand. The Java Modeling Language (JML) [6], is a behavioral inerface specificaion language (BISL) for Java, wih a rich suppor for DBC conracs. Using JML, he behavior of Java modules can be specified using pre and pos condiions, as well as class invarians, which are commonly expressed in he form of asserions, and are added o Java source code as he form of commen such as //@ or /*@...@*/. Fig. 1 shows an excerp of a Java inerface COLLABORATECOM 2014, Ocober 22-25, Miami, Unied Saes Copyrigh 2014 ICST DOI /ics.collaboraecom

2 1 public inerface Accoun{ 2 3 //@ public insance model double balance; 4 5 //@ public invarian balance > 0.0; 6 7 /*@ public normal_behavior requires am > 0.0; assignable balance; ensures balance == (\old(balance) - am); 12 public void wihdraw(double am) 13 hrows SecuriyExcepion; } Fig. 1: An Excerp of a JML-annoaed Banking Applicaion. named Accoun, which belongs o a banking applicaion and has been annoaed wih JML specificaions. A summary of he JML feaures exercised in his paper can be found in [6] and [7]. In recen years, he American Naional Insiue of Sandards (ANSI) released a sandard documen ha provides welldefined descripions of he main componens and funcions ha define RBAC [8], and i is mosly based on he well-known Z specificaion language [9]. In addiion, a dedicaed profile has been inroduced o provide suppor for expressing RBAC policies by aking boh he aforemenioned ANSI RBAC sandard as a reference foundaion as well as he well-known exensible Access Conrol Markup Language (XACML), which is a sandard language for supporing he disribued definiion and sorage & enforcemen of rich access conrol policies [10], [11]. III. PROBLEM DESCRIPTION As menioned earlier, recen lieraure includes examples showing ha mission-criical applicaions, e.g. banking mobile applicaions, have suffered from serious securiy vulnerabiliies derived from an incorrec use of heir supporing securiy APIs a he source-code level [1], [2]. Among he possible causes of his problem, insufficien sofware specificaions, including he definiion of prerequisies and hidden assumpions, as well as he exisence of muliple semanic variaions of a given securiy model, e.g., he lack of foundaion on a sandardized, well-defined model serving as a reference, are cied as common sources of incorrec implemenaions. Moreover, he problem ges aggravaed by he lack of effecive sofware verificaion procedures a he source-code level, which could affec he chances of idenifying and poenially correcing securiy vulnerabiliies exhibied by applicaions before deploying in a producion sysem. In his paper, we address an insance of his problem by choosing RBAC as he securiy model o enforce access conrol requiremens in a sofware applicaion ha is in urn composed of several modules. Each of hem possibly implemens a differen version of RBAC whose semanics may or may no sricly adhere o an exising RBAC reference model such as he one described in [8]. We herefore aim o verify ha such heerogeneous modules, when used o build a arge applicaion, correcly enforce a well-defined and consisen high-level RBAC policy, despie he differences hey may exhibi wih respec o heir inner workings relaed o RBAC feaures, which could evenually resul in securiy vulnerabiliies. Fig. 2 (a) and Fig. 2 (b) show a Java-based example where a high-level RBAC policy is enforced a runime by placing auhorizaion checks before performing securiy-sensiive operaions. In boh insances, a policy depics a role manager as a senior role o eller, and allows for users, who are assigned o roles ha happen o be senior o manager, o execue boh he ransfer and wihdraw operaions, whereas users holding eller role are allowed o execue he wihdraw operaion only. Fig. 2 (a) shows a Java class BankAccoun, which leverages he Spring Framework API [12] for implemening an auhorizaion check (lines 7-16). Similarly, Fig. 2 (b) shows anoher class DebiBankAccoun depicing an auhorizaion check using he Apache Shiro API [13] (lines 7-11). In such a seing, i is desirable o evaluae he correc enforcemen of he aforemenioned RBAC policy as follows: firs, he auhorizaion checks depiced in boh examples mus correcly specify he roles ha are allowed o execue each of he securiy-sensiive operaions. For insance, he auhorizaion check depiced in Fig. 2 (a) incorrecly allows for anoher role agen o also execue he wihdraw mehod, which in urn represens a poenial securiy vulnerabiliy. Second, he role hierarchy depiced in he high-level policy mus be correcly implemened a he source-code level by leveraging boh APIs. As roles ha happen o be senior o role manager should be allowed o execue boh he ransfer and wihdraw mehods, he role hierarchy mus be correcly implemened by placing accurae auhorizaion checks wihin he source code. In addiion, he role hierarchy mus be also defined correcly in he supporing API configuraion files. as an incorrec implemenaion, e.g. missing role names wihin he XML files defined for he Spring API, may preven users wih he role manager from execuing he ransfer mehod. A more serious problem may be originaed if users wih he role eller are allowed o execue he ransfer mehod. Finally, if users wih he role manager are allowed o execue he ransfer mehod, bu are disallowed from execuing he wihdraw mehod (Fig. 2 (b)) by incorrecly configuring he Spring API depiced in Fig. 2 (a), a given objec of class DebiBankAccoun may be lef in an inconsisen sae, hus also creaing a serious securiy problem. IV. OUR APPROACH: ASSERTION-BASED APPLICATION CONSTRUCTION In order o provide a soluion o he problem described in Secion III, we propose an approach ha combines he conceps of specificaion modeling and sofware asserions for describing securiy feaures a he source-code level. These socalled asserion-based securiy models are inended o provide compac, well-defined and consisen descripions ha may serve as a common reference for implemening securiy-relaed funcionaliy. Our approach srives o fill in he gap beween high-level descripions of securiy feaures, which are mosly absrac and implemenaion-agnosic, and supporing descripions focused a he source-code level, which are inended o cope wih boh securiy-relaed and behavioral-based specificaions. As i will be described in Secion VI, previous work has also explored he use of sofware asserions and DBClike conracs for specifying access conrol policies. However, our approach is inended o leverage he modeling capabiliies offered by sofware specificaion languages using a welldefined reference descripion of a securiy model as a source,

3 1 impor org.springframework.securiy.core.*; 2 public class BankAccoun implemens Accoun{ 3 4 public void wihdraw(double am) 5 hrows SecuriyExcepion{ 6 7 Ieraor ier = SecuriyConexHolder 8.geAuhoriies().ieraor(); 9 10 while(ier.hasnex()){ 11 GranedAuhoriy auh = ier.nex(); 12 if (!auh.geauhoriy().equals("eller") 13!auh.geAuhoriy().equals("agen")){ 14 hrow new SecuriyExcepion("Access Denied"); 15 } 16 } 17 his.balance -= am; 18 } 19 } 1 impor org.apache.shiro.*; 2 public class DebiBankAccoun{ 3 4 public void ransfer(double am, BankAccoun acc) 5 hrows SecuriyExcepion{ 6 7 if(!securiyuils.gesubjec().hasrole("manager")){ 8 9 hrow new SecuriyExcepion("Access Denied"); } acc.wihdraw(am); 14 his.balance += am; } } (a) Spring Framework API. (b) Apache Shiro API. Fig. 2: Enforcing an RBAC Policy by Leveraging Heerogeneous Securiy Modules. in such a way i no only allows for he correc communicaion, enforcemen and verificaion of securiy-relaed funcionaliy, bu i also becomes independen of any supporing APIs used a he source-code level, hus poenially allowing for is deploymen over applicaions composed of several heerogeneous modules as shown in Fig. 3: an asserion-based securiy model is inended o be enforced over a arge applicaion ha is in urn composed of wo modules leveraging securiy APIs and wo modules whose securiy-relaed funcionaliy has been implemened from scrach. This way, he semanic differences exhibied by such modules, as shown in Secion III, can be effecively miigaed. Moreover, by leveraging sae-of-hear mehodologies based on asserions, effecive auomaed verificaion of securiy properies a he source-code level becomes feasible, hus providing a means for discovering and possibly correcing poenial securiy vulnerabiliies. To address he problem insance discussed in his paper, we leverage he JML modeling capabiliies, e.g. model classes [7], o describe he ANSI RBAC sandard described in Secion II. Laer on, hese model classes are used o creae asserionbased consrains, which are in urn incorporaed ino he DBC conracs devised for each module in an applicaion. This way, a high-level RBAC policy can be specified a he source-code level by ranslaing i ino asserion-based consrains included in DBC conracs. Following our running example, Fig. 4 shows an excerp of a model class JMLRBACRole, which depics he role componen and some of is relaed funcionaliies as devised in he ANSI RBAC sandard, e.g. role hierarchies. Such a model class is leveraged in Fig. 5 o augmen he JML-based conrac depiced in Fig. 1 wih securiy-relaed asserions resricing he execuion of he wihdraw mehod o users who acivae a role senior o eller. We sar by defining a model variable role, of ype JMLRBACRole (line 5), which is laer used for defining access conrol consrains in he wo specificaion cases depiced in Fig. 5: he firs specificaion case, depiced in lines 9-14, allows one o properly execue he wihdraw mehod, e.g. deducing from he balance of a given accoun, only if he objec sored in he role variable represens a role senior o eller 1. The second specificaion 1 Following he ANSI RBAC sandard, a given role is always senior o iself. Asserion-based Securiy Model Module 1 (API 1 ) Module 3 Module 2 (API 2 ) Own Code Sofware Applicaion Fig. 3: Deploying Asserion-based Securiy Models over a Muli-module Applicaion. 1 package edu.asu.sefcom.ac.rbac; 2 public class JMLRBACRole 3 exends JMLRBACAbsracRole{ 4 5 public boolean isseniorroleof( 6 JMLRBACAbsracRole role){ 7 8 if(his.equals(role)){ reurn rue; } 9 10 reurn gealljuniorroles().conains(role); 11 } 12 } Fig. 4: An Excerp of a JML Model Class Depicing an ANSI RBAC Role Componen. case, shown in lines 16-20, allows for he wihdraw mehod o hrow a runime excepion if he aforemenioned consrain is found o be false. In addiion, such a specificaion case also prevens any modificaion o he sae (e.g. privae fields) of a given objec of ype BankAccoun from aking place. Fig. 7 depics our approach: a high-level RBAC policy, which is encoded by means of he dedicaed RBAC profile provided by XACML [11], is ranslaed ino a series of DBC conracs. Laer on, such conracs, along wih he source code

4 1 model impor edu.asu.sefcom.ac.rbac.*; 2 public inerface Accoun{ 3 4 //@ public insance model double balance; 5 //@ public insance model JMLRBACRole role; 6 7 //@ public invarian balance > 0.0; 8 9 /*@ public normal_behavior requires am > 0.0; assignable balance; ensures role.isseniorroleof( new JMLRBACRole("eller")) ==> (balance == \old(balance) - am); also public excepional_behavior requires!role.isseniorroleof( new JMLRBACRole("eller")); assignable \nohing; signals_only SecuriyExcepion; 22 public void wihdraw(double am) 23 hrows SecuriyExcepion; } Fig. 5: Enhancing a DBC conrac wih Access Conrol Asserions. 1 impor org.springframework.securiy.core.*; 2 public class BankAccoun implemens Accoun{ 3 4 //@ public represens role <- maprole(); 5 6 /*@ public pure model JMLRBACRole maprole(){ JMLRBACRole newrole = new JMLRBACRole(""); RBACMonior monior = new RBACMonior(); Ieraor ier = SecuriyConexHolder while(ier.hasnex()){ GranedAuhoriy auh = ier.nex(); if (auh.geauhoriy().equals("eller")){ newrole = new JMLRBACRole("eller"); } } reurn newrole; } } Fig. 6: An Excerp Showing a JML Absracion Funcion. for a given sofware applicaion, are fed ino JML-based auomaed ools for verificaion purposes. Since such an applicaion may be in urn composed of heerogeneous modules and each of hem possibly represens a differen API for implemening securiy-relaed funcionaliy, e.g. enforcing an RBAC policy, he configuraion files for such APIs mus be also aken ino accoun when leveraging auomaed ools for verificaion, as described in Secion III. In order o auomae he creaion of DBC conracs such as he ones depiced in Fig. 5, we designed an auomaed ool ha ranslaes RBAC policies encoded in he RBAC XACML profile ino JML-based specificaions, hus relieving policy designers and sofware archiecs from crafing such conracs manually and eliminaing a poenial source for errors. <xml...> <...> <.../> RBAC XACML Policy Files DBC/JML Conracs + Java Source Code + API Config. Files JML-based Verificaion Tools Fig. 7: A Framework for Asserion-based Securiy Assurance. As described in Secion I, we aim o provide he verificaion of securiy properies by leveraging an approach based on auomaed uni esing [14] as well as he JML specificaions depicing he asserion-based models described above. For such a purpose, we adop JET [14], which is a dedicaed ool ailored for providing auomaed runime esing of Java modules wih JML-based asserions, e.g. classes. Using JET, esers can verify he correcness of a Java module by checking he implemenaion of each mehod agains heir corresponding JML specificaions. In addiion, we also aim o provide suppor for finding possible securiy vulnerabiliies by means of saic echniques. For such a purpose, we leverage he ESC/Java2 ool [6], which is based on a heorem prover and inernally builds verificaion condiions (VCs) from he source code being analyzed, and is corresponding JML-based specificaions, which he heorem prover hen aemps o prove, hus allowing for he auomaed analysis of whole code modules wihou running he applicaions. In paricular, ESC/Java2 uses modular reasoning [15], which is regarded as an effecive echnique when used in combinaion wih saic checking since code secions can be analyzed and heir JML-based specificaions can be proved by inspecing he specificaion conracs of he mehods hey call wihin heir mehod bodies. Laer, in Secion V, we presen our findings on leveraging boh echniques in a se of case sudies depicing mission-criical Java applicaions. In order o suppor he verificaion process jus described, proper consrucs are needed o map he modeling feaures included in DBC conracs (as depiced in Fig. 5) and he implemenaion source code of each heerogeneous module. For such a purpose, we leverage he feaures offered by he JML absracion funcions [7], which allow for JML model feaures o be properly mapped o source-code level consrucs, hus providing a way o verify ha each heerogeneous module implemens a given high-level policy correcly. As an example, Fig. 6 shows an excerp where a JML model mehod is used o map he source code implemening securiy feaures as provided by he Spring Framework API wih he model feaures depiced in Fig. 5. In general, he correc enforcemen of a securiy model may involve he following cases: firs, a high-level securiy policy, which is based on a well-defined securiy model definiion, should be correcly defined and all policy conflics mus have been resolved, e.g. evaluaing a given RBAC policy by using echniques such as he ones discussed in [16]. Second, access o all proeced resources wihin a given applicaion, e.g. he wihdraw operaion depiced in Fig. 5, is guarded by an

5 TABLE I: Disribuion of Responsibiliies for Enforcing an Asserion-based Securiy Model In a Collaboraive Seing. Acor Securiy Domain Expers Securiy Policy Adminisraors Sofware Archiecs Code Developers Code Tesers Descripion of Tasks Develop an asserion-based securiy model by using a precise definiion as a reference, e.g. using he ANSI RBAC sandard. (See Fig. 4). Insaniae he securiy model o be enforced, e.g. specificaion of an RBAC policy based on he ANSI RBAC sandard. Incorporae he securiy policy ino DBC consrucs by specifying asserion-based consrains (See Fig. 5). Correcly implemen he DBC specificaions defined by sofware archiecs (including securiy checks). Provide a mapping beween he securiy model and he securiy APIs used for implemenaion purposes (See Fig. 6). Verify boh he funcional and he securiy relaed aspecs of a given sofware applicaion based on heir DBC specificaions (See Secion V). auhorizaion check (adhering o he well-known principle of complee mediaion). Following our example, auhorizaion checks should depic he RBAC consrucs defined in he overall policy, e.g. checking for he correc roles and/or permissions before execuing any sensiive operaion. Third, supporing componens for he securiy model feaures is implemened correcly, e.g. RBAC role hierarchies. Finally, we also require ha he deecion of runime policy violaions is implemened properly, e.g. excepion handling and daa consisency. Wih his in mind, for he problem insance addressed in his paper, we make he following assumpions: firs, he ANSI RBAC model is well-undersood by all paricipans in he sofware developmen process, e.g. policy designers, sofware archiecs and developers. Second, he asserion-based specificaion of he securiy model is correc: in oher words, i has been verified beforehand. Third, any supporing RBAC modules, including securiy APIs and SDKs, have been implemened correcly, even hough heir semanics wih respec o RBAC may differ, as addressed in Secion III. Finally, our approach is inended o be carried ou by he differen paricipans in he sofware developmen process, in such a way ha he process of consrucing vulnerabiliyfree sofware becomes a collaboraive responsibiliy shared by all involved acors, obviously including he source-code level developers. Table I shows a summary of he asks devised for each paricipan. V. CASE STUDY In order o provide a proof-of-concep implemenaion of our approach, we developed a reference descripion of he securiy model under sudy by using a se of JML model classes based on he case illusraed in Fig. 4. Such a reference model conains 960 lines of code grouped in 17 Java classes, including 1,383 lines of JML specificaions depicing he funcionaliy desired for RBAC as described in he ANSI RBAC sandard. For our case sudy, we leveraged a pair of open-source Java applicaions: OSCAR EMR [17], which is a rich web-based sofware plaform ailored for handling elecronic healh records (EMR). I consiss of approximaely 35,000 lines of code organized ino 110 classes and 35 packages. In addiion, we also leveraged JMoney [18], a TABLE II: A Sample RBAC Policy for Evaluaion Purposes. Role Junior Roles Sample Allowed Operaions Employee - deposi Teller Employee wihdraw, deposi Agen Employee close, deposi Manager Teller, Agen ransfer, wihdraw, deposi, close financial applicaion consising of 7,500 lines of code grouped ino 45 classes. Finally, we developed a banking applicaion depicing he running examples shown in his paper. Such an applicaion leverages he Apache Shiro and Spring Framework Securiy APIs, as well as our own RBAC monior developed for implemening securiy-relaed funcionaliy. I consiss of 36 classes and conains 1,550 lines of code as well as 1,450 lines of JML specificaions, which uilize our JML model classes in DBC conracs, as shown in Fig. 5. In order o verify he effeciveness of our approach for deecing fauly implemenaions of he RBAC securiy model, we followed an approach inspired in muaion esing [19]: we insered variaions (also known as muans) in boh he source code and he API configuraion files of he applicaions considered in our sudy, in an effor o inroduce inconsisencies in he implemenaion of heir corresponding RBAC Policies. As an example, Fig. 8 shows differen muans inroduced o he RBAC policy shown in Table II: firs, he original policy is modified o add an uninended permission (ransfer, ()) o a role employee (Fig. 8 (a)). Such a modificaion creaes a poenial securiy vulnerabiliy as i allows employee, and all oher roles senior o i, e.g. agen and eller, o execue an operaion ha was originally inended only for a role manager. Similarly, Fig. 8 (b) shows a permission (deposi, (d)) being removed from he employee role. Such a modificaion produces an inconvenience o such a role and all oher roles ha happen o be senior o i, as execuion of he deposi operaion will be denied a runime. Fig. 8 (c) shows anoher example where he original role hierarchy of he RBAC policy is modified o inroduce an uninended role (supervisor, (S)). This way, he newly-inroduced role creaes a pair of securiy vulnerabiliies: firs, i inheris he permissions from all junior roles in he hierarchy, hus allowing for he execuion of uninended operaions. Second, i also allows for a senior role in he hierarchy o obain an exra permission (audi, (a)), hus possibly allowing hem o perform uninended operaions as well. Fig. 9 shows an excerp of an XML configuraion file depicing he role hierarchy modificaion shown in Fig. 8 (c) (lines 6-8). Finally, Fig. 8 (d) shows a case when a role is removed from a role hierarchy: eller is lef aside by removing he relaionships wih boh he manager (senior) and he employee (junior) roles. I expose an inappropriae permission revocaion o no only users holding he role eller, as such a role is prevened from geing he permissions of is junior roles (e.g. deposi, (d)), bu also senior roles since i prevened from geing he permissions assigned o eller (e.g., wihdraw, (w)) including all oher permissions ha could be obained from junior roles o eller.

6 A. Asserion-based Verificaion M M Following he auomaed esing approach described in Secion IV, we conduced a se of experimens o measure he effeciveness of our asserion-based models, along wih our enhanced DBC conracs, in deecing he muaions inroduced ino he applicaions esed in our case sudy. Such experimens were carried ou on a PC equipped wih an Inel Core Duo CPU running a 3.00 GHZ, wih 4 GB of RAM, running Microsof Windows 7 64-Bi Enerprise Ediion. Firs, we measured he impac of our approach in he average execuion ime of he applicaions. As described in [14], he JML-based specificaions depicing our model classes are ranslaed ino runime asserion checking (RAC) code, which is hen execued along wih he original applicaion code for verificaion purposes. In order o provide a mapping beween he modeling feaures included in JML conracs (as depiced in Fig. 5) and he implemenaion code of each heerogeneous module, we leveraged he feaures offered by he JML absracion funcions [7]: we enhanced our supporing ool described in Secion IV o also produce absracion funcions for he referred Spring Framework and Apache Shiro APIs. We hen execued a sample race of he Java mehods exposed by our hree applicaions and calculaed he average execuion ime over 1,000 repeiions. Such a race was creaed o conain represenaive operaions for each applicaion, e.g. he race creaed for he OSCAR EMR applicaion ha conains Java mehods used o updae paien s personal daa as well as informaion abou medical appoinmens and prescripions. As shown in Table III, he inroducion of RAC code has a moderae impac on he performance, which is mosly due o he overhead inroduced by he RAC code generaed o process boh he JML conracs as well as he absracion funcions. We hen recorded he resuls obained by our ool while aemping o deec (kill) he muans inroduced in boh he configuraion of he Securiy APIs as well as he auhorizaion checks guarding each of he Java mehods conained in our sample races, following he approach depiced in Fig. 8. Table III shows a repor on he number of generaed es cases, including he number of meaningful ones produced by he ool. 2 Our meaningful es cases were able o kill all he muans insered ino our case sudy applicaions. In an addiional experimen, we compared he ime aken by our JML model classes o deec each of he muan generaion echniques depiced in Fig. 8. Once again, we used a race of Java mehods depicing he main funcionaliy for each applicaion, and used he auomaed muan-generaion ool described before o generae differen variaions o an original RBAC policy. The resuls, as shown in Fig. 12, show ha adding/removing a role o a given hierarchy is he mos cosly muaion o be deeced by he RAC code hrough processing our asserion-based JML classes. This is mosly due o he way how role hierarchies are implemened in our JML classes, by using a series of java.uil.arraylis objecs o sore references o each senior/junior role in a given hierarchy, and allowing for such references o be inspeced recursively when deermining if here is a senioriy relaionship beween wo given roles. 2 In JET, a es case T for a given mehod M is said o be meaningful if he ool is able o randomly creae values for M s formal parameers in such a way M s precondiions involving such parameers are saisfied. Oherwise T is said o be meaningless. c A E T w (a) Adding a Permission. c A M S E T (c) Adding a Role. a w d d c A E T w (b) Removing a Permission. c M A E T d (d) Removing a Role. Fig. 8: Inroducing Muans in an RBAC Policy. 1 <?xml...> <beans:bean id="rolehierarchy"...> 4 <beans:propery name="hierarchy"> 5 <beans:value> 6 manager > supervisor 7 supervisor > eller 8 supervisor > agen 9 eller > employee 10 agen > employee 11 </beans:value> 12 </beans:propery> 13 </beans:bean> Fig. 9: Inroducing Muans in Spring Framework. TABLE III: Experimenal Daa on Using JET and ESC/Java2. d w Banking JMoney OSCAR Toal mehods JET Analysis ime per mehod /s Toal analysis ime /s Runime overhead /s Generaed es cases Meaningful es cases ESC/Java2 Analysis ime per mehod /s Toal analysis ime /s As menioned in previous secions, we also leverage he ESC/Java2 ool for providing verificaion guaranees based on saic analysis echniques and our proposed approach. However, despie he suppor provided for JML-based consrucs by such a ool, some challenges mus be addressed: firs, in order o prove he correcness of a cerain source code C agains is corresponding JML conracs, he ool addiionally requires ha he JML specificaions of each library called wihin C are available, including he specificaions of addiional libraries he original ones may evenually call laer on. In some cases, such a requiremen may nooriously increase he amoun of VCs

7 1 public class Subjec{ 2 3 /*@ public normal_behavior requires rue; ensures \resul == rue \resul == false; also public excepional_behavior requires false; assignable \nohing; 11 public /*@ boolean hasrole(sring r){ 12 reurn rue; 13 } 14 } Fig. 10: Specificaions Subs for he Apache Shiro API. 1 public inerface Accoun{ 2 3 /*@ public normal_behavior requires am > 0.0; assignable balance; ensures (SecuriyUils.geSubjec() SecuriyUils.geSubjec() ==> 14 public void wihdraw(double am) 15 hrows SecuriyExcepion; 16 } Processing Time (ms) Fig. 11: Translaing Model JML Classes. Performance of JML Model CLasses agains Muaion Techniques ADD PERM REM PERM ADD ROLE REM ROLE Number of muans inroduced in RBAC Policy Fig. 12: Runime performance of a Dynamic Verificaion Approach. ha need o be proved by he ool, so he verificaion process becomes prohibiively expensive, resuling in he specificaion creep problem [15]. Second, an addiional problem arises from he lack of suppor offered by he curren ool for advanced JML conceps, such as he JML model classes inroduced in Secion IV and he JML absracion funcions also described before, as he inernally-produced VCs are oo complex for he ool o handle, which limis he applicabiliy of our asserionbased models. Subsequenly, we presen an approach ha addresses hese challenges while sill providing verificaion guaranees for our asserion-based approach. Firs, we addressed he specificaioncreep problem. In paricular, as described in Secion IV, we assumed he Securiy APIs leveraged wihin our case sudy have been implemened correcly and previously verified elsewhere. Therefore, here is no need o include heir corresponding source code in our verificaion process. Based on his observaion, we provided specificaion subs for he leveraged Securiy APIs whose JML-based annoaions are rivially saisfied. Fig. 10 shows he ranslaed JML specificaions for he mehod hasrole of class Subjec, which implemens an auhorizaion check in he Apache Shiro API, as shown in Fig. 2 (b). This process can be carried ou by securiy domain expers for he Securiy APIs and mus only be revised when new API versions are released. Second, as menioned before, he JML model classes, which are a core par of he approach shown in Secion IV, are beyond he curren capabiliies of ESC/Java2. To overcome his limiaion, we provided JML specificaions ha do no employ he JML model classes and use low-level JML conceps insead. For example, he role hierarchy depiced in Table II and Fig. 5, which checks ha he curren user is graned a role senior o eller (e.g. manager), can be ranslaed ino he JML conracs shown in Fig. 11 (lines 7-10): he references o he model class JMLRBACRole have been subsiued for he hasrole mehod of class Subjec provided by he Apache Shiro API, and are inegraed ogeher by using he operaor in JML, applied o all relevan senior roles (e.g., he manager role in line 10). Afer he preparaion seps, we applied our analysis echnique o he applicaions under our case sudy, by following he muaion-based approach described before. We used a convenional Lenovo Thinkpad T510 lapop (Inel Core i7-620m Processor, 2.66GHz, 8 GB RAM). All muans were auomaically deeced by ESC/Java2 even if hey were hidden wihin he many mehods of our case sudies. The runime of he hree applicaions under our case sudy is given in Table III. VI. DISCUSSION AND RELATED WORK The experimenal resuls depiced in Secion V-A suppor our claim ha our approach can effecively expose he se of securiy vulnerabiliies caused by he incorrec source-code level implemenaions of securiy models. In our approach, we have seleced Java for our proof-of-concep implemenaion due o is exensive use in pracice. Moreover, we have also chosen JML as he specificaion language for defining our asserionbased securiy models due o is enhanced ool suppor as well as is language design paradigm, which suppors rich behavioral specificaions. A he same ime i srives o handle he complexiy of using complex specificaion consrucs, in such a way i becomes suiable for average developers o use [6]. (see Table I). We believe our approach can be exended o oher programming languages/developmen plaforms. For insance, Spec# [20] provides rich DBC-based specificaions for he C# language, depicing an approach similar o JML. Moreover, our approach can be also applied o oher Javabased frameworks such as JEE [21] or Android [22], which may help implemen auhorizaion checks for guarding access o is core sysem services. Despie our success, some issues sill remain in he verificaion process. In paricular, ESC/Java2 may produce false posiives (in case he buil-in heorem prover canno prove a VC) and false negaives (e.g., resricions on loop unrolling). To deal wih his siuaion, a possible soluion may consider a runime esing approach, like he one we have

8 described using he JET ool, for all mehods raising warnings by ESC/Java2, hus showing a way in which boh echniques can be o provide sronger guaranees for he verificaion. Second, as shown in Table III, he number of meaningful es cases produced by he JET ool is considerably less han he number of es cases creaed, which may affec he es coverage provided by he ool and could allow for poenial securiy vulnerabiliies o remain hidden during he verificaion process. This is mosly due o he limiaions on he auomaed esing echnique [14]. A possible soluion would adop a saic approach for hose mehods whose es coverage is found o be below a given hreshold. Our work is relaed o oher effors in sofware securiy: Archiecural risk analysis [23] aemps o idenify securiy flaws on he level of he sofware archiecure and hence is unrelaed o he source-code level addressed in his approach. Language-based securiy approaches in he sense of Jif [24] allow sofware o be verified agains informaion flow policies raher han supporing specific securiy requiremens for differen Securiy APIs. Formal verificaion of RBAC properies has been already discussed in he lieraure [16]. These approaches are mosly focused on verifying he correcness of RBAC models wihou addressing heir corresponding verificaion agains an implemenaion a he source-code level. The work closely relaed o ours involves he use of DBC, which was explored by Dragoni, e al. [25]. In addiion, Belhaouari e al. inroduced an approach for he verificaion of RBAC properies based on DBC [26]. Boh approaches, while using DBC for checking RBAC properies, do no include he use of reference models o beer aid he specificaion of DBC consrains in he securiy conex. Moreover, no suppor is provided as APIindependen consrucs, such as he JML model capabiliies discussed in our approach. VII. CONCLUSIONS AND FUTURE WORK In his paper, we have addressed he problem originaed by he exisence of securiy vulnerabiliies in sofware applicaions. We have shown how such vulnerabiliies, which may exis due o he lack of proper specificaion and verificaion of securiy checks a he source-code level, can be ackled by using well-defined reference models wih he help of sofware asserions, hus providing a reference for he correc enforcemen of securiy properies over applicaions composed of heerogeneous modules such as APIs and SDKs. Fuure work would include he inroducion of asserion-based models o beer accommodae oher relevan securiy paradigms, e.g., he correc usage of crypography APIs. Also, we plan o refine our proposed RBAC model inroduced in Secion IV by inroducing an auomaed ranslaion from he specificaions depiced in he ANSI RBAC sandard, which are wrien in he Z specificaion language, o our supporing language JML. ACKNOWLEDGMENT This work was parially suppored by a gran from he US Deparmen of Energy (DE-SC ). REFERENCES [1] M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmaikov, The mos dangerous code in he world: validaing SSL cerificaes in non-browser sofware, in Proc. of he ACM Conf. on Compuer and comm. securiy, 2012, pp [2] S. Fahl, M. Harbach, T. Muders, L. Baumgärner, B. Freisleben, and M. Smih, Why eve and mallory love Android: an analysis of Android SSL (in)securiy, in Proc. of he ACM Conf. on Compuer and communicaions securiy, 2012, pp [3] R. S. Sandhu, E. J. Coyne, H. L. Feinsein, and C. E. Youman, Role- Based Access Conrol Models, IEEE Compuer, vol. 29, no. 2, pp , [4] D. S. Rosenblum, A pracical approach o programming wih asserions, IEEE Trans. Sofw. Eng., vol. 21, no. 1, pp , Jan [5] C. A. R. Hoare, An axiomaic basis for compuer programming, Communicaions of he ACM, vol. 12, no. 10, pp , Oc [6] L. Burdy, Y. Cheon, D. Cok, M. Erns, J. Kiniry, G.-T. Leavens, K. Leino, and E. Poll, An overview of JML ools and applicaions, in Proc. 8h In l Workshop on Formal Mehods for Indusrial Criical Sysems (FMICS 03), 2003, pp [7] Y. Cheon, G. Leavens, M. Siaraman, and S. Edwards, Model variables: cleanly supporing absracion in design by conrac: Research aricles, Sofw. Prac. Exper., vol. 35, no. 6, pp , May [8] American Naional Sandards Insiue Inc., Role Based Access Conrol, 2004, ANSI-INCITS [9] J. M. Spivey, The Z noaion: a reference manual. Upper Saddle River, USA: Prenice-Hall, Inc., [10] OASIS, exensible Access Conrol Markup Language (XACML) TC, 2014, hps:// [11] OASIS, XACML v3.0 Core and Hierarchical Role Based Access Conrol (RBAC) Profile Version 1.0, 2014, hp://docs.oasis-open.org/ xacml/3.0/xacml-3.0-rbac-v1-spec-cd-03-en.hml. [12] Pivoal, Inc., Spring securiy 3.1.2, 2013, hp://saic.springsource. org/spring-securiy/sie/index.hml. [13] The Apache Sofware Foundaion, Apache shiro 1.2.1, 2013, hp: //shiro.apache.org/. [14] Y. Cheon, Auomaed random esing o deec specificaion-code inconsisencies, in Proc. of he 2007 In l Conf. on Sofware Engineering Theory and Pracice, Orlando, Florida, U.S.A., [15] C. Flanagan, K. R. M. Leino, M. Lillibridge, G. Nelson, J. B. Saxe, and R. Saa, Exended saic checking for Java, in Proc. of he ACM SIGPLAN Conf. on Prog. language design and implemenaion, 2002, pp [16] H. Hu and G.-J. Ahn, Enabling verificaion and conformance esing for access conrol model, in Proc. of he 13h ACM Symp. on Access Conrol Models and Technologies, 2008, pp [17] OSCAR EMR, OSCAR Elecronic Medical Records Sysem, 2014, hp://oscar-emr.com/. [18] J. Gyger and N.l Wesbury, JMoney Financial Sysem, 2014, hp: //jmoney.sourceforge.ne/. [19] Y. Jia and M. Harman, An analysis and survey of he developmen of muaion esing, IEEE Transacions on Sofware Engineering, vol. 37, no. 5, pp , [20] M. Barne, R. Leino, and W. Schule, The spec# programming sysem: An overview, in Proc. of he 2004 In l Conf. on Consrucion and Analysis of Safe, Secure, and Ineroperable Smar Devices. Berlin: Springer-Verlag, 2005, pp [21] Oracle Inc., Java Plaform Enerprise Ediion, 2014, urlhp:// [22] Google Inc., Android, 2014, hp:// [23] G. McGraw, Sofware Securiy: Building Securiy In. Addison-Wesley, [24] A. Sabelfeld and A. C. Myers, Language-based informaion-flow securiy, IEEE J. Seleced Areas in Communicaions, vol. 21, no. 1, pp. 5 19, Jan [25] N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan, Securiy-byconrac: Toward a semanics for digial signaures on mobile code, in Public Key Infrasrucure, ser. LNCS. Springer Berlin, 2007, vol. 4582, pp [26] H. Belhaouari, P. Konopacki, R. Laleau, and M. Frappier, A design by conrac approach o verify access conrol policies, in 17h In l Conf. on Engineering of Complex Compuer Sysems (ICECCS), july 2012, pp

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Let s get physical - EDA Tools for Mobility

Let s get physical - EDA Tools for Mobility Le s ge physical - EDA Tools for Mobiliy Aging and Reliabiliy Communicaion Mobile and Green Mobiliy - Smar and Safe Frank Oppenheimer OFFIS Insiue for Informaion Technology OFFIS a a glance Applicaion-oriened

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks Carnegie Mellon Universiy From he SelecedWorks of Jia Zhang Ocober, 203 Service Oriened Soluion Modeling and Variaion Propagaion Analysis based on Archiecural uilding locks Liang-Jie Zhang Jia Zhang Available

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling

Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling Quick Verificaion of Concurren Programs by Ieraively Relaxed Scheduling Parick Mezler, Habib Saissi, Péer Bokor, Neeraj Suri Technische Univerisä Darmsad, Germany {mezler, saissi, pbokor, suri}@deeds.informaik.u-darmsad.de

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

FLORIDA INTERNATIONAL UNIVERSITY. Miami, Florida DIMUSE: AN INTEGRATED FRAMEWORK FOR DISTRIBUTED MULTIMEDIA

FLORIDA INTERNATIONAL UNIVERSITY. Miami, Florida DIMUSE: AN INTEGRATED FRAMEWORK FOR DISTRIBUTED MULTIMEDIA FLORIDA INTERNATIONAL UNIVERSITY Miami, Florida DIMUSE: AN INTEGRATED FRAMEWORK FOR DISTRIBUTED MULTIMEDIA SYSTEM WITH DATABASE MANAGEMENT AND SECURITY SUPPORT A disseraion submied in parial fulfillmen

More information

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs On he Impac of Concurrency for he Enforcemen of Enailmen Consrains in Process-driven OAs Thomas Quirchmayr and Mark rembeck Insiue for Informaion ysems, New Media Lab, WU Vienna, Ausria {firsname.lasname}@wu.ac.a

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

Web System for the Remote Control and Execution of an IEC Application

Web System for the Remote Control and Execution of an IEC Application Web Sysem for he Remoe Conrol and Execuion of an IEC 61499 Applicaion Oana ROHAT, Dan POPESCU Faculy of Auomaion and Compuer Science, Poliehnica Universiy, Splaiul Independenței 313, Bucureși, 060042,

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

Handling uncertainty in semantic information retrieval process

Handling uncertainty in semantic information retrieval process Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

Distributed Task Negotiation in Modular Robots

Distributed Task Negotiation in Modular Robots Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

Rule-Based Multi-Query Optimization

Rule-Based Multi-Query Optimization Rule-Based Muli-Query Opimizaion Mingsheng Hong Dep. of Compuer cience Cornell Universiy mshong@cs.cornell.edu Johannes Gehrke Dep. of Compuer cience Cornell Universiy johannes@cs.cornell.edu Mirek Riedewald

More information

Chapter 4 Sequential Instructions

Chapter 4 Sequential Instructions Chaper 4 Sequenial Insrucions The sequenial insrucions of FBs-PLC shown in his chaper are also lised in secion 3.. Please refer o Chaper, "PLC Ladder diagram and he Coding rules of Mnemonic insrucion",

More information

Java Metadata Interface(JMI) Specification

Java Metadata Interface(JMI) Specification Java Meadaa Inerface(JMI) Specificaion JSR 040 Java Communiy Process hp://www.jcp.org/ Version 1.0 Final Specificaion 07-June-2002 Technical commens: jmi-commens@sun.com Specificaion Lead: Ravi Dirckze,

More information

NRMI: Natural and Efficient Middleware

NRMI: Natural and Efficient Middleware NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

The Roots of Lisp paul graham

The Roots of Lisp paul graham The Roos of Lisp paul graham Draf, January 18, 2002. In 1960, John McCarhy published a remarkable paper in which he did for programming somehing like wha Euclid did for geomery. 1 He showed how, given

More information

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey

More information

IntentSearch:Capturing User Intention for One-Click Internet Image Search

IntentSearch:Capturing User Intention for One-Click Internet Image Search JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

IDEF3 Process Description Capture Method

IDEF3 Process Description Capture Method IDEF3 Process Descripion Capure Mehod IDEF3 is par of he IDEF family of mehods developmen funded by he US Air Force o provide modelling suppor for sysems engineering and enerprise inegraion 2 IDEF3 Mehod

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

Managing XML Versions and Replicas in a P2P Context

Managing XML Versions and Replicas in a P2P Context Managing XML Versions and Replicas in a P2P Conex Deise de Brum Saccol1 1,2, Nina Edelweiss 2, Renaa de Maos Galane 2,4, Carlo Zaniolo 3 2 Insiuo de Informáica - Universidade Federal do Rio Grande do Sul

More information

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a 3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi

More information

TRANSFORMER TEST SYSTEMS

TRANSFORMER TEST SYSTEMS TRANSFORMER TEST SYSTEMS 20203 TRANSFORMER TEST SYSTEMS FROM PHENIX Broad Range Covers Mos Applicaions PHENIX Technologies offers a complee line of Transformer Tes Sysems, from a small porable uni wih

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

BI-TEMPORAL INDEXING

BI-TEMPORAL INDEXING BI-TEMPORAL INDEXING Mirella M. Moro Uniersidade Federal do Rio Grande do Sul Poro Alegre, RS, Brazil hp://www.inf.ufrgs.br/~mirella/ Vassilis J. Tsoras Uniersiy of California, Rierside Rierside, CA 92521,

More information

Evaluation and Improvement of Region-based Motion Segmentation

Evaluation and Improvement of Region-based Motion Segmentation Evaluaion and Improvemen of Region-based Moion Segmenaion Mark Ross Universiy Koblenz-Landau, Insiue of Compuaional Visualisics, Universiässraße 1, 56070 Koblenz, Germany Email: ross@uni-koblenz.de Absrac

More information

An Implementation of the PCP, SRP, D-PCP, M-PCP, and FMLP Real-Time Synchronization Protocols in LITMUS RT

An Implementation of the PCP, SRP, D-PCP, M-PCP, and FMLP Real-Time Synchronization Protocols in LITMUS RT An Implemenaion of he PCP, SRP, D-PCP, M-PCP, and FMLP Real-Time Synchronizaion Proocols in LITMUS RT Björn B. Brandenburg and James H. Anderson The Universiy of Norh Carolina a Chapel Hill Absrac We exend

More information

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication Inernaional Conference on Compuaional Sciences and Is Applicaions ICCSA 2008 A Scheme o Reduce Loss during P Handover considering Auhenicaion Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, and Youngsong Mun

More information

Selective Offloading in Mobile Edge Computing for the Green Internet of Things

Selective Offloading in Mobile Edge Computing for the Green Internet of Things EDGE COMPUTING FOR THE INTERNET OF THINGS Selecive Offloading in Mobile Edge Compuing for he Green Inerne of Things Xinchen Lyu, Hui Tian, Li Jiang, Alexey Vinel, Sabia Maharjan, Sein Gjessing, and Yan

More information

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries

Axiomatic Foundations and Algorithms for Deciding Semantic Equivalences of SQL Queries Axiomaic Foundaions and Algorihms for Deciding Semanic Equivalences of SQL Queries Shumo Chu, Brendan Murphy, Jared Roesch, Alvin Cheung, Dan Suciu Paul G. Allen School of Compuer Science and Engineering

More information

Design Alternatives for a Thin Lens Spatial Integrator Array

Design Alternatives for a Thin Lens Spatial Integrator Array Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of

More information

Visualizing Complex Notions of Time

Visualizing Complex Notions of Time Visualizing Complex Noions of Time Rober Kosara, Silvia Miksch Insiue of Sofware Technology, Vienna Universiy of Technology, Vienna, Ausria Absrac Time plays an imporan role in medicine. Condiions are

More information

BEST DYNAMICS NAMICS CRM A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM

BEST DYNAMICS NAMICS CRM A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM DYNAMICS CR A Publicaion by elogic s fines Microsof Dynamics CRM Expers { ICS CRM BEST OF 2014 A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM NAMICS CRM { DYNAMICS M INTRODUCTION

More information

4.1 3D GEOMETRIC TRANSFORMATIONS

4.1 3D GEOMETRIC TRANSFORMATIONS MODULE IV MCA - 3 COMPUTER GRAPHICS ADMN 29- Dep. of Compuer Science And Applicaions, SJCET, Palai 94 4. 3D GEOMETRIC TRANSFORMATIONS Mehods for geomeric ransformaions and objec modeling in hree dimensions

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

Representing Non-Manifold Shapes in Arbitrary Dimensions

Representing Non-Manifold Shapes in Arbitrary Dimensions Represening Non-Manifold Shapes in Arbirary Dimensions Leila De Floriani,2 and Annie Hui 2 DISI, Universiy of Genova, Via Dodecaneso, 35-646 Genova (Ialy). 2 Deparmen of Compuer Science, Universiy of Maryland,

More information

The University of Sheffield Department of Computer Science. Indexing XML Databases: Classifications, Problems Identification and a New Approach

The University of Sheffield Department of Computer Science. Indexing XML Databases: Classifications, Problems Identification and a New Approach The Universiy of Sheffield Deparmen of Compuer Science Indexing XML Daabases: Classificaions, Problems Idenificaion and a New Approach Research Memorandum CS-7-5 Mohammed Al-Badawi Compuer Science Dep

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Research Article Auto Coloring with Enhanced Character Registration

Research Article Auto Coloring with Enhanced Character Registration Compuer Games Technology Volume 2008, Aricle ID 35398, 7 pages doi:0.55/2008/35398 Research Aricle Auo Coloring wih Enhanced Characer Regisraion Jie Qiu, Hock Soon Seah, Feng Tian, Quan Chen, Zhongke Wu,

More information

tr_lisp.asc Page 1 McESE-FranzLISP: McMASTER EXPERT SYSTEM EXTENSION OF FranzLISP F. Franek Technical Report no TR-22/88

tr_lisp.asc Page 1 McESE-FranzLISP: McMASTER EXPERT SYSTEM EXTENSION OF FranzLISP F. Franek Technical Report no TR-22/88 r_lisp.asc Page 1 McESE-FranzLISP: McMASTER EXPERT SYSTEM EXTENSION OF FranzLISP F. Franek Technical Repor no TR-22/88 Deparmen of Compuer Science and Sysems McMaser Universiy 1988 McESE-FranzLISP: McMASTER

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD 21 s Inernaional Conference on Composie Maerials Xi an, 20-25 h Augus 2017 LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD Hyunseok Kwon 1, Yurim Park

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move

More information

Concurrency Control and Recovery in Transactional Process Management

Concurrency Control and Recovery in Transactional Process Management In: Proceedings of he ACM Symposium on Principles of Daabase Sysems (PODS 99), pages 316-326, Philadelphia, Pennsylvania, USA, May/June, 1999. Concurrency Conrol and Recovery in Transacional Process Managemen

More information

Petri Nets for Object-Oriented Modeling

Petri Nets for Object-Oriented Modeling Peri Nes for Objec-Oriened Modeling Sefan Wi Absrac Ensuring he correcness of concurren rograms is difficul since common aroaches for rogram design do no rovide aroriae mehods This aer gives a brief inroducion

More information

Why Waste a Perfectly Good Abstraction?

Why Waste a Perfectly Good Abstraction? Why Wase a Perfecly Good Absracion? Arie Gurfinkel and Marsha Chechik Deparmen of Compuer Science, Universiy of Torono, Torono, ON M5S 3G4, Canada. Email: arie,chechik@cs.orono.edu Absrac. Sofware model-checking

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing

More information

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471 Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

A Progressive-ILP Based Routing Algorithm for Cross-Referencing Biochips

A Progressive-ILP Based Routing Algorithm for Cross-Referencing Biochips 16.3 A Progressive-ILP Based Rouing Algorihm for Cross-Referencing Biochips Ping-Hung Yuh 1, Sachin Sapanekar 2, Chia-Lin Yang 1, Yao-Wen Chang 3 1 Deparmen of Compuer Science and Informaion Engineering,

More information

(10) Patent No.: US 6,931,558 Bl (57) ABSTRACT ~ :!j 304 ; OS. BMR. & TSM files needed at restore time. Boot ~II backed-up ~ 106

(10) Patent No.: US 6,931,558 Bl (57) ABSTRACT ~ :!j 304 ; OS. BMR. & TSM files needed at restore time. Boot ~II backed-up ~ 106 111111 1111111111111111111111111111111111111111111111111111111111111 US006931558Bl (12) Unied Saes Paen Jeffe e ai. (10) Paen No.: US 6,931,558 Bl (45) Dae of Paen: Aug. 16,2005 (54) COMPUTER RESTORATION

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)

More information

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker.

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker. Slide A Principled Approach o MILP Modeling John Hooer Carnegie Mellon Universiy Worshop on MIP Columbia Universiy, Augus 008 Proposal MILP modeling is an ar, bu i need no be unprincipled. Slide Proposal

More information

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER ABSTRACT Modern graphics cards for compuers, and especially heir graphics processing unis (GPUs), are designed for fas rendering of graphics.

More information

Accenture Report Documentum 4i on NetApp filers Deployment Guide

Accenture Report Documentum 4i on NetApp filers Deployment Guide Accenure Repor Documenum 4i on NeApp filers Deploymen Guide Documen Purpose This projec was conduced by Accenure o research & develop a Nework Appliance filer and Documenum 4i Deploymen Guide. This documen

More information

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen

More information

Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments

Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments 11 Inernaional Join Conference of IEEE TrusCom-11/IEEE ICESS-11/FCST-11 Flogger: A File-cenric Logger for Monioring File Access and Transfers wihin Cloud Compuing Environmens Ryan K L Ko, Peer Jagadpramana,

More information

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER Gusaf Hendeby, Jeroen D. Hol, Rickard Karlsson, Fredrik Gusafsson Deparmen of Elecrical Engineering Auomaic Conrol Linköping Universiy,

More information

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl US 20110153728A1 (19) nied Saes (12) Paen Applicaion Publicaion (10) Pub. No.: S 2011/0153728

More information

Building a Generic (cross-domains) Basic Software on top of the XtratuM hypervisor

Building a Generic (cross-domains) Basic Software on top of the XtratuM hypervisor Building a Generic (cross-domains) Basic Sofware on op of he Xrau hypervisor Jean-Jacques ETGE (1), Julien GALIZZI (1), Paul ARBERET (1), Bernard SANCHEZ (2), Jonahan PATY (2), Gilles SAINT-AUBIN (3),

More information

Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available.

Provided by the author(s) and NUI Galway in accordance with publisher policies. Please cite the published version when available. Provided by he auhor(s) and NUI Galway in accordance wih publisher policies. Please cie he published version when available. Tile Conneciviy soluions o link a blueooh camera o he inerne Auhor(s) Ionas,

More information

Overview of Board Revisions

Overview of Board Revisions s Sysem Overview MicroAuoBox Embedded PC MicroAuoBox II can be enhanced wih he MicroAuoBox Embedded PC. The MicroAuoBox EmbeddedPC is powered via he MicroAuoBox II power inpu connecor. Wih he common power

More information

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game The Beer Dock 2002-08-13 17:55:44-0700 The Beer Dock: Three and a Half Implemenaions of he Beer Disribuion Game Michael J. Norh[1] and Charles M. Macal Argonne Naional Laboraory, Argonne, Illinois Absrac

More information