首页 > 最新文献

2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems最新文献

英文 中文
Automated Veri.cation of the Dependability of Object-Oriented Real-Time Systems 自动化的真实。面向对象实时系统的可靠性评价
Hui Ding, Can Zheng, G. Agha, L. Sha
We develop an effective approach to formally specify and automatically verify the dependability of object-oriented real-time systems based on the Actor model and Real-Time Maude. Our approach decomposes an application into functional components represented as concurrent objects or actors, and separately specifies the timing constraints using RTSynchronizer. It achieves the goal of automatically verifying the dependability and timing properties of the target system by implementing the operational semantics of Actor and RTSynchronizer in Real-Time Maude, which supports executable specification and various temporal model checking analysis. We demonstrate the effectiveness of our approach by an annotated case study of the Simplex architecture.
基于Actor模型和real-time模型,我们开发了一种有效的方法来形式化地指定和自动验证面向对象实时系统的可靠性。我们的方法将应用程序分解为表示为并发对象或参与者的功能组件,并使用RTSynchronizer单独指定时间约束。通过在Real-Time Maude中实现Actor和RTSynchronizer的操作语义,支持可执行规范和各种时间模型检查分析,实现了对目标系统的可靠性和时序属性的自动验证。我们通过对Simplex体系结构的一个带注释的案例研究来证明我们方法的有效性。
{"title":"Automated Veri.cation of the Dependability of Object-Oriented Real-Time Systems","authors":"Hui Ding, Can Zheng, G. Agha, L. Sha","doi":"10.1109/WORDS.2003.1267505","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267505","url":null,"abstract":"We develop an effective approach to formally specify and automatically verify the dependability of object-oriented real-time systems based on the Actor model and Real-Time Maude. Our approach decomposes an application into functional components represented as concurrent objects or actors, and separately specifies the timing constraints using RTSynchronizer. It achieves the goal of automatically verifying the dependability and timing properties of the target system by implementing the operational semantics of Actor and RTSynchronizer in Real-Time Maude, which supports executable specification and various temporal model checking analysis. We demonstrate the effectiveness of our approach by an annotated case study of the Simplex architecture.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115326711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Redundant Optical Path Design Based on Multiagents and Its Experimental Evaluation 基于多智能体的冗余光路设计及其实验评价
Y. Kakuda, K. Suezawa, S. Inoue, H. Nakazato
This paper discusses a fault tolerant technique called redundant path design in wavelength division multiplexing networks, in which backup paths between source and destination nodes, such that when primary paths between them fail the primary paths are quickly switched to the backup paths, are prepared. Unlike the previous centralized approaches, this paper proposes two multiagent-based methods called Method 1 and Method 2, which is an improvement of Method 1, and evaluates optimality and efficiency of the proposed methods by simulation experiments. The simulation results show that, compared with Method 1, Method 2 has higher optimality with reasonable time.
本文讨论了波分复用网络中冗余路径设计的容错技术,该技术在源节点和目的节点之间建立备份路径,当主路径失效时,主路径可以快速切换到备用路径。与以往的集中式方法不同,本文提出了方法1和方法2两种基于多智能体的方法,这是对方法1的改进,并通过仿真实验评估了所提出方法的最优性和效率。仿真结果表明,与方法1相比,方法2在合理的时间内具有更高的最优性。
{"title":"Redundant Optical Path Design Based on Multiagents and Its Experimental Evaluation","authors":"Y. Kakuda, K. Suezawa, S. Inoue, H. Nakazato","doi":"10.1109/WORDS.2003.1267502","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267502","url":null,"abstract":"This paper discusses a fault tolerant technique called redundant path design in wavelength division multiplexing networks, in which backup paths between source and destination nodes, such that when primary paths between them fail the primary paths are quickly switched to the backup paths, are prepared. Unlike the previous centralized approaches, this paper proposes two multiagent-based methods called Method 1 and Method 2, which is an improvement of Method 1, and evaluates optimality and efficiency of the proposed methods by simulation experiments. The simulation results show that, compared with Method 1, Method 2 has higher optimality with reasonable time.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129345212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vulnerabilities - From Data Analysis to Protection Mechanisms 安全漏洞-从数据分析到保护机制
R. Iyer, Shuo Chen, Jun Xu, Z. Kalbarczyk
This paper combines an analysis of data on security vulnerabilities (published in the Bugtraq database) and a focused source-code examination to (i) develop a finite state machine (FSM) model to depict and reason about security vulnerabilities and (ii) to extract characteristics shared by a large class of commonly seen vulnerabilities (e.g., integer overflow, heap overflow, format string, and stack buffer overflow). This information is used to devise Transparent Runtime Randomization (TRR), a generic, randomization-based technique for protecting against a wide range of security attacks. TRR dynamically and randomly relocates a program’s stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space. Making a program’s memory layout different each time it runs foils the attacker’s assumptions about the memory layout of the vulnerable program and defeats potential attacks. TRR is implemented by changing the Linux dynamic program loader; hence, it is transparent to applications. TRR incurs less than 9% program startup overhead and no runtime overhead.
本文结合了对安全漏洞数据的分析(发表在Bugtraq数据库中)和集中的源代码检查,以(i)开发有限状态机(FSM)模型来描述和推理安全漏洞;(ii)提取一大类常见漏洞(例如整数溢出、堆溢出、格式字符串和堆栈缓冲区溢出)共有的特征。此信息用于设计透明运行时随机化(TRR),这是一种基于随机化的通用技术,用于防止各种安全攻击。TRR动态地、随机地在应用程序内存地址空间内重新定位程序的堆栈、堆、共享库和部分运行时控制数据结构。使程序每次运行时的内存布局不同,可以挫败攻击者对易受攻击程序的内存布局的假设,从而挫败潜在的攻击。TRR是通过改变Linux动态程序加载器实现的;因此,它对应用程序是透明的。TRR产生的程序启动开销小于9%,并且没有运行时开销。
{"title":"Security Vulnerabilities - From Data Analysis to Protection Mechanisms","authors":"R. Iyer, Shuo Chen, Jun Xu, Z. Kalbarczyk","doi":"10.1109/WORDS.2003.1267548","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267548","url":null,"abstract":"This paper combines an analysis of data on security vulnerabilities (published in the Bugtraq database) and a focused source-code examination to (i) develop a finite state machine (FSM) model to depict and reason about security vulnerabilities and (ii) to extract characteristics shared by a large class of commonly seen vulnerabilities (e.g., integer overflow, heap overflow, format string, and stack buffer overflow). This information is used to devise Transparent Runtime Randomization (TRR), a generic, randomization-based technique for protecting against a wide range of security attacks. TRR dynamically and randomly relocates a program’s stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space. Making a program’s memory layout different each time it runs foils the attacker’s assumptions about the memory layout of the vulnerable program and defeats potential attacks. TRR is implemented by changing the Linux dynamic program loader; hence, it is transparent to applications. TRR incurs less than 9% program startup overhead and no runtime overhead.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123087244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Middleware Design and Human Factor 中间件设计与人为因素
T. Nakajima
Our future daily lives will be augmented by various computers and sensors, and our environments change their behavior according to the current situation. Each person will have many personal devices such as celluar phones, PDA's, MP3 Players voice recorders. Also, many appliances will be available near us such as various displays, televisions, and information kiosk. We believe that these devices and appliances are communicated in a spontaneous way, and provide useful information to us. It is important to offer middleware infrastructures to hide a variety of complexities from application programmers to make easy to develop pervasive computing applications. However, we have not enough experiences how to build middleware for pervasive computing, and it is important to share knowledge among research communities. In this paper, we present three middleware infrastructures for pervasive computing, that have been developed in our projects. These middleware infrastructures hide various complexities such as context-awareness to make it easy to develop pervasive computing applications. We found that hiding context-awareness requires to take into account human factors when designing middleware. We show the overview of our middlewares, and discuss some human factor issues while designing our middlewares.
我们未来的日常生活将被各种各样的计算机和传感器所增强,我们的环境会根据当前的情况改变它们的行为。每个人都会有许多个人设备,如手机、掌上电脑、MP3播放器、录音机。此外,许多电器将在我们附近可用,如各种显示器、电视和信息亭。我们相信这些设备和设备以一种自发的方式进行交流,并为我们提供有用的信息。重要的是提供中间件基础设施,向应用程序编程人员隐藏各种复杂性,以便于开发普及计算应用程序。然而,我们在如何为普适计算构建中间件方面还没有足够的经验,因此在研究社区之间分享知识是很重要的。在本文中,我们介绍了在我们的项目中开发的用于普惠计算的三种中间件基础结构。这些中间件基础设施隐藏了各种复杂性,例如上下文感知,从而使开发普及计算应用程序变得容易。我们发现隐藏上下文感知需要在设计中间件时考虑人为因素。我们将展示中间件的概述,并讨论在设计中间件时的一些人为因素问题。
{"title":"Middleware Design and Human Factor","authors":"T. Nakajima","doi":"10.1109/WORDS.2003.1267508","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267508","url":null,"abstract":"Our future daily lives will be augmented by various computers and sensors, and our environments change their behavior according to the current situation. Each person will have many personal devices such as celluar phones, PDA's, MP3 Players voice recorders. Also, many appliances will be available near us such as various displays, televisions, and information kiosk. We believe that these devices and appliances are communicated in a spontaneous way, and provide useful information to us. It is important to offer middleware infrastructures to hide a variety of complexities from application programmers to make easy to develop pervasive computing applications. However, we have not enough experiences how to build middleware for pervasive computing, and it is important to share knowledge among research communities. In this paper, we present three middleware infrastructures for pervasive computing, that have been developed in our projects. These middleware infrastructures hide various complexities such as context-awareness to make it easy to develop pervasive computing applications. We found that hiding context-awareness requires to take into account human factors when designing middleware. We show the overview of our middlewares, and discuss some human factor issues while designing our middlewares.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":" 47","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120934060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Presence Service Architecture for Supporting Spontaneous Interaction 支持自发交互的状态服务体系结构
T. Nakajima
Ubiquitous computing environments create a seamless boundary between atoms and bits. Especially, in the near future , embedding various types of sensors in our daily lives enables an application to customize their behavior according to its user's situation. Also, physical objects in our daily lives can be used to manipulate information in cyber spaces. however, the vision requires a new software infrastructure that collaborates various appliances in a spontaneous way. The paper proposes an architecture to realize the vision in our daily computing environments by creating a society of appliances. Our architecture is called Pervasive Servers, that embeds micro servers called stationary pervasive servers everywhere. Also, a personal pervasive server that is carried by each person coordinates the embedded servers that are near the person. The architecture is very attractive because it is easy to personalize the coordination according to each person's policy. We also show that there are several useful applications based on the architecture.
无处不在的计算环境在原子和比特之间创造了一个无缝的边界。特别是在不久的将来,在我们的日常生活中嵌入各种类型的传感器,使应用程序能够根据用户的情况定制它们的行为。此外,我们日常生活中的实物也可以用来操纵网络空间中的信息。然而,这个愿景需要一个新的软件基础设施,以一种自发的方式协作各种设备。本文提出了一个架构,通过创建一个设备社会,在我们的日常计算环境中实现这一愿景。我们的架构被称为普适服务器,它在任何地方嵌入了被称为固定普适服务器的微型服务器。此外,由每个人携带的个人普及服务器与靠近该个人的嵌入式服务器进行协调。这种架构很有吸引力,因为它很容易根据每个人的策略进行个性化协调。我们还展示了基于该体系结构的几个有用的应用程序。
{"title":"A Presence Service Architecture for Supporting Spontaneous Interaction","authors":"T. Nakajima","doi":"10.1109/WORDS.2003.1267525","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267525","url":null,"abstract":"Ubiquitous computing environments create a seamless boundary between atoms and bits. Especially, in the near future , embedding various types of sensors in our daily lives enables an application to customize their behavior according to its user's situation. Also, physical objects in our daily lives can be used to manipulate information in cyber spaces. however, the vision requires a new software infrastructure that collaborates various appliances in a spontaneous way. The paper proposes an architecture to realize the vision in our daily computing environments by creating a society of appliances. Our architecture is called Pervasive Servers, that embeds micro servers called stationary pervasive servers everywhere. Also, a personal pervasive server that is carried by each person coordinates the embedded servers that are near the person. The architecture is very attractive because it is easy to personalize the coordination according to each person's policy. We also show that there are several useful applications based on the architecture.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"370 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Dependability of the Battlefield Single Integrated Picture through Metrics for Modeling and Simulation of Time-Critical Scenarios 通过时间关键场景建模与仿真的度量提高战场单一集成图像的可靠性
M. Ceruti, J. L. Kaina
This paper presents a report of an ongoing research project to test and evaluate temporal and other dependability properties of the battlefield single integrated picture (SIP). It explores modeling and simulations of information flows in the battlespace with a view toward enhancing the SIP. The main emphasis will be on level-one data fusion, i.e. detection, identification and tracking of platforms and classifying them as friendly, neutral or hostile. Thus, the study will focus on metrics that pertain directly to the flow of relevant information in the battlespace during the time period of a particular target-classification task, and the dependability of that information.
本文介绍了一项正在进行的研究项目的报告,以测试和评估战场单集成图像(SIP)的时间和其他可靠性特性。它探索了战场空间信息流的建模和仿真,以期增强SIP。重点将放在一级数据融合上,即探测、识别和跟踪平台,并将其分类为友好、中立或敌对。因此,研究将侧重于在特定目标分类任务期间与战场空间相关信息流动直接相关的指标,以及该信息的可靠性。
{"title":"Enhancing Dependability of the Battlefield Single Integrated Picture through Metrics for Modeling and Simulation of Time-Critical Scenarios","authors":"M. Ceruti, J. L. Kaina","doi":"10.1109/WORDS.2003.1267492","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267492","url":null,"abstract":"This paper presents a report of an ongoing research project to test and evaluate temporal and other dependability properties of the battlefield single integrated picture (SIP). It explores modeling and simulations of information flows in the battlespace with a view toward enhancing the SIP. The main emphasis will be on level-one data fusion, i.e. detection, identification and tracking of platforms and classifying them as friendly, neutral or hostile. Thus, the study will focus on metrics that pertain directly to the flow of relevant information in the battlespace during the time period of a particular target-classification task, and the dependability of that information.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126432109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Automated Control Systems for the Safety Integrity Levels 3 and 4 安全完整性等级3和4的自动控制系统
W. Halang
Programs employed for purposes of safety related control must be formally safety licensed, which constitutes a very difficult and hitherto not satisfactorily solved problem. Striving for utmost simplicity and easy comprehensibility of verification methods, the programming methods cause/effect tables and function block diagrams based on verified libraries are assigned to the upper two Safety Integrity Levels SIL 4 and SIL 3, resp., as they are the only ones so far allowing to verify highly safety critical automation software in trustworthy, easy and economic ways. For each of the two SILs a dedicated, a low complexity execution platform is presented supporting the corresponding programming method architecturally. Their hardware is fault detecting or supervised by a fail safe logic, resp., to initiate emergency shut-downs in case of malfunctions. By design, there is no semantic gap between the programming and machine execution levels, enabling the safety licensing of application software by extremely simple, but rigorous methods, viz., diverse back translation and inspection. Operating in strictly periodic fashion, the controllers exhibit fully predictable real time behaviour.
用于安全相关控制目的的程序必须获得正式的安全许可,这是一个非常困难且迄今尚未令人满意地解决的问题。力求验证方法的最大简单性和易于理解性,基于验证库的编程方法因果表和功能框图分别分配给安全完整性等级最高的两个等级:SIL 4和SIL 3。因为它们是迄今为止唯一允许以值得信赖、简单和经济的方式验证高度安全关键自动化软件的机构。对于这两种sil,分别提供了一个专用的、低复杂度的执行平台,在体系结构上支持相应的编程方法。它们的硬件是故障检测或由故障安全逻辑监督,例如。,以便在发生故障时启动紧急停机。通过设计,在编程和机器执行层之间没有语义上的差距,使得应用软件的安全许可通过极其简单而严格的方法,即多样化的回译和检查。控制器以严格的周期性方式运行,表现出完全可预测的实时行为。
{"title":"Automated Control Systems for the Safety Integrity Levels 3 and 4","authors":"W. Halang","doi":"10.1109/WORDS.2003.1267488","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267488","url":null,"abstract":"Programs employed for purposes of safety related control must be formally safety licensed, which constitutes a very difficult and hitherto not satisfactorily solved problem. Striving for utmost simplicity and easy comprehensibility of verification methods, the programming methods cause/effect tables and function block diagrams based on verified libraries are assigned to the upper two Safety Integrity Levels SIL 4 and SIL 3, resp., as they are the only ones so far allowing to verify highly safety critical automation software in trustworthy, easy and economic ways. For each of the two SILs a dedicated, a low complexity execution platform is presented supporting the corresponding programming method architecturally. Their hardware is fault detecting or supervised by a fail safe logic, resp., to initiate emergency shut-downs in case of malfunctions. By design, there is no semantic gap between the programming and machine execution levels, enabling the safety licensing of application software by extremely simple, but rigorous methods, viz., diverse back translation and inspection. Operating in strictly periodic fashion, the controllers exhibit fully predictable real time behaviour.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"42 8 Pt 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Adaptive Fault-Tolerant Component Model 自适应容错组件模型
J. Fraga, Frank Siqueira, F. Favarim
This paper presents a component model for building distributed applications with fault-tolerance requirements. The AFT-CCM model selects the configuration of replicated services during execution time based on QoS requirements specified by the user. The configuration is managed using a set of components that deal with the non-functional aspects of the application. The characteristics of this model and the results obtained with its implementation are described along this paper.
本文提出了一个组件模型,用于构建具有容错需求的分布式应用程序。AFT-CCM模型根据用户指定的QoS需求,在执行期间选择复制服务的配置。使用一组处理应用程序的非功能方面的组件来管理配置。文中介绍了该模型的特点和实现结果。
{"title":"An Adaptive Fault-Tolerant Component Model","authors":"J. Fraga, Frank Siqueira, F. Favarim","doi":"10.1109/WORDS.2003.1267506","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267506","url":null,"abstract":"This paper presents a component model for building distributed applications with fault-tolerance requirements. The AFT-CCM model selects the configuration of replicated services during execution time based on QoS requirements specified by the user. The configuration is managed using a set of components that deal with the non-functional aspects of the application. The characteristics of this model and the results obtained with its implementation are described along this paper.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128423366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Foucault's Pendulum in the Distributed Control Lab 分布式控制实验室中的福柯摆
A. Rasche, Peter Tröger, M. Dirska, A. Polze
The ’Distributed Control Lab’ [6] at Hasso-Plattner-Institute, University of Potsdam allows experimentation with a variety of physical equipment via the web (intra and internet), among them the Lego Mindstorm robots and Foucault’s Pendulum. In order to conduct control experiments, students may write programs, which are validated, run on a simulator, and eventually downloaded on the actual control device. We use online replacement of software components (dynamic re-configuration) as a safeguard mechanism to avoid damage to our hardware. Our research focuses on the extension of middleware concepts to embedded devices. The component-based architecture of the laboratory in conjunction with given timing and safety constraints dictated by the experiments make our infrastructure an ideal candidate for studying system predictability, availability and security in context of middleware-based dynamic control systems. Within this paper we are going to describe our extensible architecture for hosting physical control experiments and focus on Foucault’s Pendulum as a case study. For the Pendulum we have implemented a dynamic recon.guration algorithm, which is able to replace erroneous user-supplied control programs with a verified safety controller at runtime. In addition we are going to discuss the design of custom-built controller hardware which allows us to meet the timing constraints of the Pendulum experiment with a commercial-off-the-shelf (COTS) operating system and middleware. Architectural characteristics of our hardware and software as well as a performance evaluation of the recon.guration process will be discussed in some detail.
波茨坦大学哈索-普拉特纳研究所的“分布式控制实验室”[6]允许通过网络(内部和互联网)对各种物理设备进行实验,其中包括乐高头脑风暴机器人和福科钟摆。为了进行控制实验,学生可以编写程序,经过验证,在模拟器上运行,最终下载到实际的控制设备上。我们使用在线更换软件组件(动态重新配置)作为保障机制,以避免损坏我们的硬件。我们的研究重点是将中间件概念扩展到嵌入式设备。实验室的基于组件的体系结构与实验规定的给定时间和安全约束相结合,使我们的基础设施成为研究基于中间件的动态控制系统环境中的系统可预测性、可用性和安全性的理想候选者。在本文中,我们将描述用于托管物理控制实验的可扩展架构,并将重点放在福柯摆上作为案例研究。对于钟摆,我们实现了动态侦察。生成算法,能够在运行时用经过验证的安全控制器替换错误的用户提供的控制程序。此外,我们将讨论定制控制器硬件的设计,这使我们能够满足钟摆实验的时间限制,使用商用现货(COTS)操作系统和中间件。对我们的硬件和软件的架构特点以及性能进行了评估。将详细讨论生成过程。
{"title":"Foucault's Pendulum in the Distributed Control Lab","authors":"A. Rasche, Peter Tröger, M. Dirska, A. Polze","doi":"10.1109/WORDS.2003.1267543","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267543","url":null,"abstract":"The ’Distributed Control Lab’ [6] at Hasso-Plattner-Institute, University of Potsdam allows experimentation with a variety of physical equipment via the web (intra and internet), among them the Lego Mindstorm robots and Foucault’s Pendulum. In order to conduct control experiments, students may write programs, which are validated, run on a simulator, and eventually downloaded on the actual control device. We use online replacement of software components (dynamic re-configuration) as a safeguard mechanism to avoid damage to our hardware. Our research focuses on the extension of middleware concepts to embedded devices. The component-based architecture of the laboratory in conjunction with given timing and safety constraints dictated by the experiments make our infrastructure an ideal candidate for studying system predictability, availability and security in context of middleware-based dynamic control systems. Within this paper we are going to describe our extensible architecture for hosting physical control experiments and focus on Foucault’s Pendulum as a case study. For the Pendulum we have implemented a dynamic recon.guration algorithm, which is able to replace erroneous user-supplied control programs with a verified safety controller at runtime. In addition we are going to discuss the design of custom-built controller hardware which allows us to meet the timing constraints of the Pendulum experiment with a commercial-off-the-shelf (COTS) operating system and middleware. Architectural characteristics of our hardware and software as well as a performance evaluation of the recon.guration process will be discussed in some detail.","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128262559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Provision of Multimedia Services in a Mobile Ad Hoc Network 在移动自组织网络中提供多媒体服务
Waseem Sheikh, Basit Shafiq, R. Paul, A. Ghafoor
Recent advances in wireless technology and availability of mobile computing devices with networking capabilities have generated a lot of interest in wireless ad hoc networks for quality of service (QoS) based multimedia applications. In this paper, we address the problem of QoS guaranteed transmission of pre-orchestrated multimedia data over multiple heterogeneous virtual channels (MHVCs) in a mobile, multihop, wireless network with no fixed infrastructure. This network consists of mobile multimedia database servers which may be connected to wired networks (e.g. ATM or Internet) via satellite links or stand alone. In order to achieve QoS guaranteed transmission, we propose a QoS routing (QoSR) protocol based on the prediction of users’ mobility profile. The proposed scheme establishes and maintains QoS guaranteed MHVCs between the source and the destination nodes for the duration of the route life time (RLT).
无线技术的最新进展和具有网络功能的移动计算设备的可用性引起了人们对用于基于服务质量(QoS)的多媒体应用程序的无线自组织网络的极大兴趣。在本文中,我们讨论了在没有固定基础设施的移动、多跳无线网络中,通过多个异构虚拟信道(mhvc)传输预先编排的多媒体数据的QoS保证问题。该网络由移动多媒体数据库服务器组成,这些服务器可以通过卫星链路连接到有线网络(例如ATM或Internet),也可以单独连接。为了实现QoS保证传输,提出了一种基于用户移动性预测的QoS路由(QoSR)协议。该方案在路由生命时间(RLT)内建立并维护源节点和目的节点之间有QoS保证的mhvc。
{"title":"Provision of Multimedia Services in a Mobile Ad Hoc Network","authors":"Waseem Sheikh, Basit Shafiq, R. Paul, A. Ghafoor","doi":"10.1109/WORDS.2003.1267494","DOIUrl":"https://doi.org/10.1109/WORDS.2003.1267494","url":null,"abstract":"Recent advances in wireless technology and availability of mobile computing devices with networking capabilities have generated a lot of interest in wireless ad hoc networks for quality of service (QoS) based multimedia applications. In this paper, we address the problem of QoS guaranteed transmission of pre-orchestrated multimedia data over multiple heterogeneous virtual channels (MHVCs) in a mobile, multihop, wireless network with no fixed infrastructure. This network consists of mobile multimedia database servers which may be connected to wired networks (e.g. ATM or Internet) via satellite links or stand alone. In order to achieve QoS guaranteed transmission, we propose a QoS routing (QoSR) protocol based on the prediction of users’ mobility profile. The proposed scheme establishes and maintains QoS guaranteed MHVCs between the source and the destination nodes for the duration of the route life time (RLT).","PeriodicalId":350761,"journal":{"name":"2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1