166,453 Hits in 5.0 sec

Enforcing Availability in Failure-Aware Communicating Systems [chapter]

Hugo A. López, Flemming Nielson, Hanne Riis Nielson
2016 Lecture Notes in Computer Science  
Practitioners in CPS take availability into consideration, programming applications in a failure-aware fashion. First, application-based QoS policies replace old node-based ones.  ...  Models in GC q can accommodate in this way application-based QoS policies, instead of a node-centric approach. Our second contribution relates to the verification of failure-aware protocols.  ...  López has benefitted from travel support by the EU COST Action IC1201: Behavioural Types for Reliable Large-Scale Software Systems (BETTY).  ... 
doi:10.1007/978-3-319-39570-8_13 fatcat:pm7zmek7pzb2dpjqa4gphrujtq


Xiaoyan Hong, Dijiang Huang, Mario Gerla, Zhen Cao
2008 Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08  
failure or under attacks.  ...  In this position paper, we present a new trust architecture and model -Situation-Aware Trust (SAT) -to address several important trust issues in vehicular networks that we believe are essential to overcome  ...  This property is very useful in a vehicular communication system, since a vehicle usually does not care which entity it communicates with.  ... 
doi:10.1145/1403007.1403015 fatcat:a5plyyoaujahvpqnb5zi4bobaa

Design for failure: Software challenges of digital ecosystems

Ian Somerville
2007 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference  
 Many rules enforced in different ways by different systems.   Information is distributed -users may not be aware of where information is located, who owns information, etc..  ...  Software engineering in a DBE  System of systems.  System instantiation involves cooperation and communication between entities in the ecosystem.     Evolution  Uncontrollable!  ...  .  Their adoption is dependent on users trusting the resultant socio-technical systems.  Failure by researchers and practitioners to design for failure will inevitable lead to the failure of the vision  ... 
doi:10.1109/dest.2007.371934 fatcat:jkwdzosi3bcnrnwnwa5scree3i

Page 115 of Peace Research Abstracts Journal Vol. 41, Issue 2 [page]

2004 Peace Research Abstracts Journal  
Beyond privacy: confronting locational surveil- lance in wireless communication. Communication Law and Policy 8(1):1-23, 2003. COMMUNICATION. PRIVACY. WIRELESS SYSTEMS.  ...  These data also become available to law enforcement agents. Social repercussions include a shift in the power of individual and institutional actors to create types of places and types of persons.  ... 

A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications

Carlos Colman-Meixner, Chris Develder, Massimo Tornatore, Biswanath Mukherjee
2016 IEEE Communications Surveys and Tutorials  
One of the critical challenges is resiliency: disruptions due to failures (either accidental or because of disasters or attacks) may entail significant revenue losses (e.g., US$ 25.5 billion in 2010 for  ...  Such failures may originate at any of the major components in a cloud architecture (and propagate to others): (i) the servers hosting the application, (ii) the network interconnecting them (on different  ...  A similar approach to enforce resilient objects placement is "availability-aware MapReduce data placement mechanism" (ADAPT) [218] .  ... 
doi:10.1109/comst.2016.2531104 fatcat:vzvkai7nkrbbda63fesn7zw4di

Page 13 of Criminal Justice Digest Vol. 4, Issue 2 [page]

1976 Criminal Justice Digest  
available resources.  ...  Public law enforcement officials also have the responsibility of helping the business community create an atmosphere of awareness and knowledge of local and state laws which affect their daily opera- tion  ... 

Workshop on Software Technologies for Ultra-Large Scale Systems

Richard Gabriel, Rick Kazman, Linda Northrop, Douglas Schmidt, Kevin Sullivan
2007 29th International Conference on Software Engineering (ICSE'07 Companion)  
This workshop, the First ICSE Workshop on ULS systems, has several goals: to raise awareness of ULS systems in the ICSE community; to further our understanding of the characteristics of such systems; to  ...  explore the unique research problems of ULS systems; to help foster a community who study and build ULS systems; and to understand the role and the shortcomings of traditional software engineering concepts  ...  Workshop Goals This workshop, the First ICSE Workshop on ULS systems, has several goals: to raise awareness of ULS systems in the ICSE community; to further our understanding of the characteristics of  ... 
doi:10.1109/icsecompanion.2007.85 dblp:conf/icse/GabrielKNSS07 fatcat:f5zxdcsjwffvjhkkxzdxuruszy

A Policy-Aware Model for Intelligent Transportation Systems [article]

Zacharenia Garofalaki, Georgios Katsikogiannis Department of Informatics, University of Piraeus, Greece)
2017 arXiv   pre-print
Recent advancements in the field of smart machine-to-machine (M2M) communications impose the necessity to improve the service delivery by enforcing appropriate security rules.  ...  It is shown that the policy enforcement enables enhanced security management capabilities, increased agility, and better service levels in the field of smart M2M communications.  ...  ACKNOWLEDGMENT The research presented in this paper has been partly supported by the Erasmus+ project Open Models Initiantive -OMI, Key Activity 2.  ... 
arXiv:1706.04803v2 fatcat:zvi2xnu26zbadbr4ffjxye6lfu

Managing data retention policies at scale

Jun Li, Sharad Singhal, Ram Swaminathan, Alan H. Karp
2011 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops  
To achieve scalability, our service uses Hadoop MapReduce to perform parallel management tasks, such as data encryption and decryption, key distribution and retention policy enforcement.  ...  To achieve scalability, our service uses Hadoop MapReduce to perform parallel management tasks, such as data encryption and decryption, key distribution and retention policy enforcement.  ...  Failures can include (1) communication failure to backend structured data stores, (2) failure to local file systems; (3) communication failure to HDFS; and (4) crash of machines and processes.  ... 
doi:10.1109/inm.2011.5990674 dblp:conf/im/LiSSK11 fatcat:w65v5lzp7jec5oebgvp5grrjd4

Policy-Based Bandwidth Management for Tactical Networks with the Agile Computing Middleware

Niranjan Suri, Marco Carvalho, James Lott, Mauro Tortonesi, Jeffrey Bradshaw, Mauro Arguedas, Maggie Breedy
2006 MILCOM 2006  
Bandwidth allocation and enforcement in tactical networks is a challenging problem.  ...  In addition, both network topology and availability of network resources vary rapidly in the mobile ad-hoc scenario.  ...  In the context of data-aware publishsubscribe systems, it opportunistically allocates computational resources in the network while taking into consideration load, connectivity, and bandwidth availability  ... 
doi:10.1109/milcom.2006.302213 fatcat:b44y7ox4zzgi7pxmy3qcc4evyi

Page 26 of Current Vol. , Issue 365 [page]

1994 Current  
The reaction of each failure of repression is to extend it still further, drawing in landlords,  ...  In many instances, a particular activity is criminalized precisely because of the lack of real community moral consensus.  ... 

Page 350 of Transportation Quarterly Vol. 3, Issue 4 [page]

1949 Transportation Quarterly  
If it fails to function—as in many cases it does—the whole safety program may be inefficient and ineffective. Yet no one is immediately aware of the source of the failure.  ...  Current weaknesses in the field of accident records are due in part to the absence of any external evidence of the functioning of an accident-records system.  ... 

A Perspective Study on the Urban River Pollution in Malaysia

C.M.M. Chin, Y.J. Ng
2015 Chemical Engineering Transactions  
Environmental education would be the key essence in curbing river pollution via the adoption of nature- oriented approach, bottom-up approach and establishment of a central river information system.  ...  As a result, data derived shown the key factor underlying the cause of river pollution is human factor with low awareness, information and knowledge leading to the lack of sensitivity in river restoration  ...  At present, the only water information system available in Malaysia is known as InfoBanjir (DID, 2005 ) that provides real-time flood information.  ... 
doi:10.3303/cet1545125 doaj:7a4161d47521414fb1657a40561bede3 fatcat:yrhe2cowpjc7fezwsjdywicsci

Cognitively Inspired Decision Making for Software Agents: Integrated Mechanisms for Action Selection, Expectation, Automatization and Non‐Routine Problem Solving

Aregahegn Seifu Negatu
2009 Knowledge engineering review (Print)  
In such settings, it is reasonable to assume that the overhearing resources will be essentially limited, thus allowing the overhearing agent to overhear only a subset of inter-agent communications.  ...  The restriction of selectivity is mainly compelled by the specific characteristics of large-scale multi-agent systems.  ...  We implement the automatization and deautomatization cognitive functions as a self-organizing system in the IDA framework.  ... 
doi:10.1017/s0269888909990245 fatcat:2nznvrrw3ffadj7qdegncbcfee

BAMR: a novel bandwidth aware multipath reactive routing protocol for mobile ad hoc network

Sanjeev Kumar Prasad, Karamjit Bhatia
2018 International Journal of Systems Control and Communications  
Providing successful end to end communication in mobile ad hoc networks is a challenging task.  ...  In this paper, we aim at providing a bandwidth aware multipath reactive routing protocol for mobile ad hoc networks.  ...  The proposed protocol BAMR requires less information for estimation of link failure rate and finds bandwidth aware paths in network for communication.  ... 
doi:10.1504/ijscc.2018.088338 fatcat:o7mmml7hnjgq5bmoqj5526ndo4
« Previous Showing results 1 — 15 out of 166,453 results