Online Library TheLib.net » New Results in Dependability and Computer Systems: Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunów, Poland
cover of the book New Results in Dependability and Computer Systems: Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunów, Poland

Ebook: New Results in Dependability and Computer Systems: Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunów, Poland

00
27.01.2024
0
0

DepCoS – RELCOMEX is an annual series of conferences organized by the Institute of Computer Engineering, Control and Robotics (CECR), Wrocław University of Technology, since 2006. Its idea came from the heritage of the other two cycles of events: RELCOMEX Conferences (1977 – 89) and Microcomputer Schools (1985 – 95) which were then organized by the Institute of Engineering Cybernetics, the previous name of CECR. In contrast to those preceding meetings focused on the conventional reliability analysis, the DepCoS mission is to develop a more comprehensive approach to computer system performability, which is now commonly called dependability. Contemporary technical systems are integrated unities of technical, information, organization, software and human resources. Diversity of the processes being realized in the system, their concurrency and their reliance on in-system intelligence significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods. The submissions included in this volume illustrate variety of problems that need to be explored in the dependability analysis: methodologies and practical tools for modeling, design and simulation of the systems, security and confidentiality in information processing, specific issues of heterogeneous, today often wireless, computer networks, or management of transportation networks.




DepCoS – RELCOMEX is an annual series of conferences organized by the Institute of Computer Engineering, Control and Robotics (CECR), Wroc?aw University of Technology, since 2006. Its idea came from the heritage of the other two cycles of events: RELCOMEX Conferences (1977 – 89) and Microcomputer Schools (1985 – 95) which were then organized by the Institute of Engineering Cybernetics, the previous name of CECR. In contrast to those preceding meetings focused on the conventional reliability analysis, the DepCoS mission is to develop a more comprehensive approach to computer system performability which is now commonly called dependability.

Contemporary technical systems are integrated unities of technical, information, organization, software and human resources. Diversity of the processes being realized in the system, their concurrency and their reliance on in-system intelligence significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods.

The submissions included in this volume illustrate variety of problems that need to be explored in the dependability analysis: methodologies and practical tools for modelling, design and simulation of the systems, security and confidentiality in information processing, specific issues of heterogeneous, today often wireless, computer networks, or management of transportation networks.




DepCoS – RELCOMEX is an annual series of conferences organized by the Institute of Computer Engineering, Control and Robotics (CECR), Wroc?aw University of Technology, since 2006. Its idea came from the heritage of the other two cycles of events: RELCOMEX Conferences (1977 – 89) and Microcomputer Schools (1985 – 95) which were then organized by the Institute of Engineering Cybernetics, the previous name of CECR. In contrast to those preceding meetings focused on the conventional reliability analysis, the DepCoS mission is to develop a more comprehensive approach to computer system performability which is now commonly called dependability.

Contemporary technical systems are integrated unities of technical, information, organization, software and human resources. Diversity of the processes being realized in the system, their concurrency and their reliance on in-system intelligence significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods.

The submissions included in this volume illustrate variety of problems that need to be explored in the dependability analysis: methodologies and practical tools for modelling, design and simulation of the systems, security and confidentiality in information processing, specific issues of heterogeneous, today often wireless, computer networks, or management of transportation networks.


Content:
Front Matter....Pages 1-13
Application Level Execution Model for Transparent Distributed Computing....Pages 1-10
Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case....Pages 11-24
Risk Assessment Aspects in Mastering the Value Function of Security Measures....Pages 25-39
Reduction of Computational Cost in Mutation Testing by Sampling Mutants....Pages 41-51
Use of Neural Network Algorithms in Prediction of XLPE HV Insulation Properties under Thermal Aging....Pages 53-61
Computer Simulation Analysis of Cluster Model of Totally-Connected Flows on the Chain Mail....Pages 63-73
Assessment of Network Coding Mechanism for the Network Protocol Stack 802.15.4/6LoWPAN....Pages 75-82
Reliability Analysis of Discrete Transportation Systems Using Critical States....Pages 83-92
A Reference Model for the Selection of Open Source Tools for Requirements Management....Pages 93-107
A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms....Pages 109-118
A Quality Estimation of Mutation Clustering in C# Programs....Pages 119-129
Using Virtualization Technology for Fault-Tolerant Replication in LAN....Pages 131-140
Quantification of Simultaneous-AND Gates in Temporal Fault Trees....Pages 141-151
Improving of Non-Interactive Zero-Knowledge Arguments Using Oblivious Transfer....Pages 153-171
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions....Pages 173-182
Optimization of Privacy Preserving Mechanisms in Mining Continuous Patterns....Pages 183-194
Technical and Program Aspects on Monitoring of Highway Flows (Case Study of Moscow City)....Pages 195-204
Integral Functionals of semi-Markov Processes in Reliability Problems....Pages 205-213
Generating Repair Rules for Database Integrity Maintenance....Pages 215-224
Optimization Algorithm for the Preservation of Sensor Coverage....Pages 225-235
Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools....Pages 237-244
Critical Infrastructures Safety Assessment Combining Fuzzy Models and Bayesian Belief Network under Uncertainties....Pages 245-254
Towards Evolution Methodology for Service-Oriented Systems....Pages 255-273
The LVA-Index in Clustering....Pages 275-283
Three Different Approaches in Pedestrian Dynamics Modeling – A Case Study....Pages 285-294
The End-To-End Rate Adaptation Application for Real-Time Video Monitoring....Pages 295-305
Discrete Transportation Systems Quality Performance Analysis by Critical States Detection....Pages 307-314
An Expanded Concept of the Borrowed Time as a Mean of Increasing the Average Speed Isotropy on Regular Grids....Pages 315-324
Freshness Constraints in the RT Framework....Pages 325-334
Transformational Modeling of BPMN Business Process in SOA Context....Pages 335-344
Algorithmic and Information Aspects of the Generalized Transportation Problem for Linear Objects on a Two Dimensional Lattice....Pages 345-352
Reliability Assessment of Supporting Satellite System EGNOS....Pages 353-363
Vbam – Byzantine Atomic Multicast in LAN Based on Virtualization Technology....Pages 365-374
An Approach to Automated Verification of Multi-Level Security System Models....Pages 375-388
A Web Service-Based Platform for Distributed Web Applications Integration....Pages 389-398
Universal Platform for Composite Data Stream Processing Services Management....Pages 399-407
Proposal of Cost-Effective Tenant-Based Resource Allocation Model for a SaaS System....Pages 409-420
Automatic Load Testing of Web Application in SaaS Model....Pages 421-430
Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices....Pages 431-438
On Testing Wireless Sensor Networks....Pages 439-448
Towards Precise Architectural Decision Models....Pages 449-458
Slot Selection Algorithms for Economic Scheduling in Distributed Computing with High QoS Rates....Pages 459-468
K-Induction Based Verification of Real-Time Safety Critical Systems....Pages 469-478
Native Support for Modbus RTU Protocol in Snort Intrusion Detection System....Pages 479-487
SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns....Pages 489-500
System for Estimation of Patient’s State – Discussion of the Approach....Pages 501-511
Dependability Aspects of Autonomic Cooperative Computing Systems....Pages 513-521
Life Cycle Cost through Reliability....Pages 523-530
Verification of Infocommunication System Components for Modeling and Control of Saturated Traffic in Megalopolis....Pages 531-542
Shuffle–Based Verification of Component Compatibility....Pages 543-552
Back Matter....Pages 553-554


DepCoS – RELCOMEX is an annual series of conferences organized by the Institute of Computer Engineering, Control and Robotics (CECR), Wroc?aw University of Technology, since 2006. Its idea came from the heritage of the other two cycles of events: RELCOMEX Conferences (1977 – 89) and Microcomputer Schools (1985 – 95) which were then organized by the Institute of Engineering Cybernetics, the previous name of CECR. In contrast to those preceding meetings focused on the conventional reliability analysis, the DepCoS mission is to develop a more comprehensive approach to computer system performability which is now commonly called dependability.

Contemporary technical systems are integrated unities of technical, information, organization, software and human resources. Diversity of the processes being realized in the system, their concurrency and their reliance on in-system intelligence significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods.

The submissions included in this volume illustrate variety of problems that need to be explored in the dependability analysis: methodologies and practical tools for modelling, design and simulation of the systems, security and confidentiality in information processing, specific issues of heterogeneous, today often wireless, computer networks, or management of transportation networks.


Content:
Front Matter....Pages 1-13
Application Level Execution Model for Transparent Distributed Computing....Pages 1-10
Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case....Pages 11-24
Risk Assessment Aspects in Mastering the Value Function of Security Measures....Pages 25-39
Reduction of Computational Cost in Mutation Testing by Sampling Mutants....Pages 41-51
Use of Neural Network Algorithms in Prediction of XLPE HV Insulation Properties under Thermal Aging....Pages 53-61
Computer Simulation Analysis of Cluster Model of Totally-Connected Flows on the Chain Mail....Pages 63-73
Assessment of Network Coding Mechanism for the Network Protocol Stack 802.15.4/6LoWPAN....Pages 75-82
Reliability Analysis of Discrete Transportation Systems Using Critical States....Pages 83-92
A Reference Model for the Selection of Open Source Tools for Requirements Management....Pages 93-107
A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms....Pages 109-118
A Quality Estimation of Mutation Clustering in C# Programs....Pages 119-129
Using Virtualization Technology for Fault-Tolerant Replication in LAN....Pages 131-140
Quantification of Simultaneous-AND Gates in Temporal Fault Trees....Pages 141-151
Improving of Non-Interactive Zero-Knowledge Arguments Using Oblivious Transfer....Pages 153-171
Virtual Environment for Implementation and Testing Private Wide Area Network Solutions....Pages 173-182
Optimization of Privacy Preserving Mechanisms in Mining Continuous Patterns....Pages 183-194
Technical and Program Aspects on Monitoring of Highway Flows (Case Study of Moscow City)....Pages 195-204
Integral Functionals of semi-Markov Processes in Reliability Problems....Pages 205-213
Generating Repair Rules for Database Integrity Maintenance....Pages 215-224
Optimization Algorithm for the Preservation of Sensor Coverage....Pages 225-235
Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools....Pages 237-244
Critical Infrastructures Safety Assessment Combining Fuzzy Models and Bayesian Belief Network under Uncertainties....Pages 245-254
Towards Evolution Methodology for Service-Oriented Systems....Pages 255-273
The LVA-Index in Clustering....Pages 275-283
Three Different Approaches in Pedestrian Dynamics Modeling – A Case Study....Pages 285-294
The End-To-End Rate Adaptation Application for Real-Time Video Monitoring....Pages 295-305
Discrete Transportation Systems Quality Performance Analysis by Critical States Detection....Pages 307-314
An Expanded Concept of the Borrowed Time as a Mean of Increasing the Average Speed Isotropy on Regular Grids....Pages 315-324
Freshness Constraints in the RT Framework....Pages 325-334
Transformational Modeling of BPMN Business Process in SOA Context....Pages 335-344
Algorithmic and Information Aspects of the Generalized Transportation Problem for Linear Objects on a Two Dimensional Lattice....Pages 345-352
Reliability Assessment of Supporting Satellite System EGNOS....Pages 353-363
Vbam – Byzantine Atomic Multicast in LAN Based on Virtualization Technology....Pages 365-374
An Approach to Automated Verification of Multi-Level Security System Models....Pages 375-388
A Web Service-Based Platform for Distributed Web Applications Integration....Pages 389-398
Universal Platform for Composite Data Stream Processing Services Management....Pages 399-407
Proposal of Cost-Effective Tenant-Based Resource Allocation Model for a SaaS System....Pages 409-420
Automatic Load Testing of Web Application in SaaS Model....Pages 421-430
Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices....Pages 431-438
On Testing Wireless Sensor Networks....Pages 439-448
Towards Precise Architectural Decision Models....Pages 449-458
Slot Selection Algorithms for Economic Scheduling in Distributed Computing with High QoS Rates....Pages 459-468
K-Induction Based Verification of Real-Time Safety Critical Systems....Pages 469-478
Native Support for Modbus RTU Protocol in Snort Intrusion Detection System....Pages 479-487
SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns....Pages 489-500
System for Estimation of Patient’s State – Discussion of the Approach....Pages 501-511
Dependability Aspects of Autonomic Cooperative Computing Systems....Pages 513-521
Life Cycle Cost through Reliability....Pages 523-530
Verification of Infocommunication System Components for Modeling and Control of Saturated Traffic in Megalopolis....Pages 531-542
Shuffle–Based Verification of Component Compatibility....Pages 543-552
Back Matter....Pages 553-554
....
Download the book New Results in Dependability and Computer Systems: Proceedings of the 8th International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, September 9-13, 2013, Brunów, Poland for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen