A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method
2013
2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE)
The distributed functionality and/or control in these systems and the local view of the scenarios of the systems can lead to unexpected behavior during execution time, known as Emergent Behaviors (EB) ...
Detecting and fixing EB/IS in the early phases, may save costs of software projects by a factor of 20 to 100. ...
"Detecting and Fixing Emergent Behaviors in Distributed
Software Systems Using a Message Content Independent Method." ...
doi:10.1109/ase.2013.6693148
dblp:conf/kbse/Fard13
fatcat:zqcptwd7dza27bscjynhgnbasm
Detecting and Fixing Emergent Behaviors in Distributed Software Systems Using a Message Content Independent Method
[article]
2016
The distributed functionality and/or control in these systems and the local view of the scenarios of the systems can lead to unexpected behavior during execution time, known as Emergent Behaviors (EB) ...
Detecting and fixing EB/IS in the early phases, may save costs of software projects by a factor of 20 to 100. ...
Q3: How to define a message content independent method (a general method) to detect and resolve those problems? ...
doi:10.11575/prism/25594
fatcat:feczrgcopjdi3bmwttk4ivk3ky
Multi-level Framework Development of Distributed Underwater Detection System Based on UML Modeling
2017
DEStech Transactions on Computer Science and Engineering
Aiming at the distributed structure of the new-type underwater detection system, the paper proposes a development method of underwater detection system based on UML, constructs information type and subsystem ...
by analyzing static structure and dynamic behaviors of the system, realizes the analysis modeling of distributed underwater detection system, proposes layering software framework structure, and enhances ...
As underwater detection system is a small system which has relatively clear and fixed tasks as well as complex tasks, in a distributed control mode, when the node module has the certain independence and ...
doi:10.12783/dtcse/aice-ncs2016/5693
fatcat:sgsmwdpk35cdzmpbd5yblrvsiu
A Perspective on the Future of Middleware-based Software Engineering
2007
Future of Software Engineering (FOSE '07)
Acknowledgments This work is part of the PLASTIC 5 and AMIGO 6 IST projects, funded by the European Commission under the FP6 contract numbers 026955 and 004182 respectively. ...
Software engineering methods are emerging in that direction, e.g., model-based verification [4, 12] . ...
Also, SE methods and related tools devised for OO and CB software, can be used for designing and developing high-quality distributed software applications [21, 51] . ...
doi:10.1109/fose.2007.2
dblp:conf/icse/IssarnyCG07
fatcat:frkdbpnojze3dfku2r2hpynlry
Adaptive byzantine fault tolerance support for agent oriented systems: The BDARX
2019
International Journal of Advanced and Applied Sciences
faults and make the system more reliable and efficient. ...
This paper proposes Byzantine DARX (BDARX) architecture which endows DARX with the ability to handle Byzantine faults, and thus it allows the building of complex software systems to deal with arbitrary ...
Afterwards replica broadcasts a commit message following the contents of the prepare message. ...
doi:10.21833/ijaas.2019.02.009
fatcat:nyjk6mn645hqne473yoz6scw4a
Attacks and defences on intelligent connected vehicles: A survey
2020
Digital Communications and Networks
Then, we investigate and summarize the available defences against these attacks and classify them into four categories: cryptography, network security, software vulnerability detection, and malware detection ...
A B S T R A C T Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle ...
Toyota [166] , Hyundai [167] ) and airplane companies (e.g., Boeing [168] ) use static, and dynamic analysis of software behavior in safety-critical missions to fix the bugs. ...
doi:10.1016/j.dcan.2020.04.007
fatcat:bdfjxoyibfez5ebob352xlurmu
A Kernel-Based Communication Fault Injector for Dependability Testing of Distributed Systems
[chapter]
2006
Lecture Notes in Computer Science
Software-implemented fault injection is a powerful strategy to test fault-tolerant protocols in distributed environments. ...
The tool injects faults directly into the message exchange subsystem, allowing the definition of test scenarios from a wide fault model that can affect messages being sent and/or received. ...
behavior of real faults: message drop and duplication, late delivery and content manipulation. ...
doi:10.1007/11678779_13
fatcat:d3atssi3rzdl5mz6jcok3z4wsi
Principles of Agent-Oriented Programming
[chapter]
2011
Multi-Agent Systems - Modeling, Control, Programming, Simulations and Applications
It combines the theoretical and practical concepts of AI and Distributed Systems (DS). The solution is also based on social behaviors where the cooperative behavior is utilized to solve a problem. ...
The Multi-Agent Systems (MAS) is one of the research areas of DAI, and uses autonomous agents with their own actions and behaviors. ...
Other advantages are the fact that the system can anticipate the arrival of a stream of cars and take a preventive action, and detect other abnormal behavior of the traffic. ...
doi:10.5772/14248
fatcat:ahyxkvksrnf65jrk7pyk5yghsy
AutoMate: Enabling Autonomic Applications on the Grid
2006
Cluster Computing
by biological systems and deal with similar challenges of complexity, heterogeneity, and uncertainty. ...
The increasing complexity, heterogeneity, and dynamism of emerging pervasive Grid environments and applications has necessitated the development of autonomic self-managing solutions, that are inspired ...
Similarly, applications typically combine multiple independent and distributed software elements such as components, services, real-time data, experiments and data sources. ...
doi:10.1007/s10586-006-7561-5
fatcat:pakuaryd3nhgxnrxuvh24wgkke
Open Problems in Robotic Anomaly Detection
[article]
2018
arXiv
pre-print
Namely, we discuss non-malicious faults, invalid data, intentional anomalous behavior, hierarchical anomaly detection, distribution of computation, and anomaly correction on the fly. ...
As such, we provide a brief insight-focused discussion and frameworks of thought on some compelling open problems with anomaly detection in robotic systems. ...
John Dolan and David Bourne at The Robotics Institute at CMU gave us insight into various aspects of robotics. DISTRIBUTION A. Approved for public release: distribution unlimited. ...
arXiv:1809.03565v1
fatcat:xadvrc7yfffo3lhtcetb5575jq
Malware Detection, Supportive Software Agents and Its Classification Schemes
2012
International journal of network security and its applications
Malware is a general term that is used to describe the category of malicious software that is part of security threats to the computer and internet system. ...
Over time, the task of curbing the emergence of malware and its dastard activities has been identified in terms of analysis, detection and containment of malware. ...
e-mail generator This is a malware tool that can be used to generate large number of email purposefully for undesired message distribution to other system. ...
doi:10.5121/ijnsa.2012.4603
fatcat:ep3a3uydffdnrmhybtoqhuplfq
BASEMENT: an architecture and methodology for distributed automotive real-time systems
1997
IEEE transactions on computers
BASEMENT TM is a distributed real-time architecture developed for vehicle internal use in the automotive industry. ...
service for nonsafety critical applications, 4) a communication infrastructure providing efficient communication between distributed devices, 5) a program development methodology allowing resource independent ...
For instance, to facilitate fault detection and recovery, we use more traditional static-cyclic scheduling, rather than more flexible (and less traceable) dynamic scheduling methods such as Fixed-Priority ...
doi:10.1109/12.620482
fatcat:w457u3zcjbgbhoomwxmvysm4ua
A framework for detecting unfolding emergencies using humans as sensors
2016
SpringerPlus
Validation and experimental results based on messages posted during earthquakes occurred in Italy are reported. which permits unrestricted use, distribution, and reproduction in any medium, provided you ...
An ontology for the HaaS paradigm in the context of emergency detection is defined. Then, a modular architecture, independent of a specific emergency type, is designed. ...
The baseline has been generated in an offline phase and represents a statistical model of the terms used during a fixed time window of several months. ...
doi:10.1186/s40064-016-1674-y
pmid:26811805
pmcid:PMC4717126
fatcat:jz3qvlhpsfbvnh53gad77am2zm
CAN for critical embedded automotive networks
2002
IEEE Micro
LAN or telecom systems do not know any communication and any message contents in advance of system design, and the system does not use these contents. ...
Different ECUs can respond only to known messages and can transmit only those messages that they are programmed to transmit, and the system uses the message contents. ...
doi:10.1109/mm.2002.1028473
fatcat:rlfawda55vbffdoki7qf4zbfma
Flood decision support system on agent grid: method and implementation
2007
Enterprise Information Systems
which can transit the information for long distance.This system is now applied as a module in the City Emergency Interact Project. ...
the wireless sensor network for data acquisition and software agent technology for legacy system integration. ...
We are going to be content with fixing the organization parameters, i.e. agents'tasks, agents'roles. ...
doi:10.1080/17517570601092184
fatcat:rxwgyisb2ncvhjyb7e7zoq2xkm
« Previous
Showing results 1 — 15 out of 27,373 results