Service Availability


Book Description

This book constitutes the thoroughly refereed post-proceedings of the Second International Service Availability Symposium, ISAS 2005, held in Berlin, Germany in April 2005. The 15 revised full papers presented together with a keynote talk were carefully selected for inclusion in the book. The papers are organized in topical sections on data and computation availability, specifying, modeling and verifying service availability, high-availability by service-oriented architectures, modeling and composition, and verification and availability assessment.




Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems


Book Description

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD philosophy, that relies on an overlay approach to SPD, on a methodology for composable SPD, on the use of semantics, and on the design of embedded systems with built-in SPD. The book explores new ground and illustrates the development of approximately forty prototypes capable of managing and enhancing SPD, including secure boot, trusted execution environments, adaptable radio interfaces, and different implementations of the middleware for measuring and composing SPD.




Advances in Network-Embedded Management and Applications


Book Description

The general trend of modern network devices towards greater intelligence and programmability is accelerating the development of systems that are increasingly autonomous and to a certain degree self-managing. Examples range from router scripting environments to fully programmable server blades. This has opened up a new field of computer science research, reflected in this new volume. This selection of contributions to the first ever international workshop on network-embedded management applications (NEMA) features six papers selected from submissions to the workshop, held in October 2010 at Niagara Falls, Canada. They represent a wide cross-section of the current work in this vital field of inquiry. Covering a diversity of perspectives, the volume’s dual structure first of all examines the ‘enablers’ for NEMAs—the platforms, frameworks, and development environments which facilitate the evolution of network-embedded management and applications. The second section of the book covers network-embedded applications that might both empower and benefit from such enabling platforms. These papers cover topics ranging from deciding where to best place management control functions inside a network to a discussion of how multi-core hardware processors can be leveraged for traffic filtering applications. The section concludes with an analysis of a delay-tolerant network application in the context of the ‘One Laptop per Child’ program. There is a growing recognition that it is vital to make network operation and administration as easy as possible to contain operational expenses and cope with ever shorter control cycles. This volume provides researchers in the field with the very latest in current thinking.




Networked Services and Applications - Engineering, Control and Management


Book Description

The EUNICE (European Network of Universities and Companies in Information and Communication technology) (http://www.eunice-forum.org) mission is to jointly - velop and promote the best and most compatible standard of European higher edu- tion and professionals in ICT by increasing scientific and technical knowledge in the field of ICT and developing their applications in the economy. The EUNICE Wo- shop is an annual event. This year the workshop was sponsored by IFIP TC 6 WG 6.6: Management of Networks and Distributed Systems. Eight years ago, the seventh edition of the EUNICE workshop took place in Tro- heim with the topic “Adaptable Networks and Teleservices.” Since then “adaptability” has become a topic which is found in most ICT conferences. The concept teleservices, which is a telecommunication domain concept from the 1980s, has been lifted out of the telecom community and is now found with new and sometimes mysterious names such as service–oriented architecture and cloud computing.




Dependable Embedded Systems


Book Description

This Open Access book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have emerged particularly within the last five years. This book introduces the most prominent reliability concerns from today’s points of view and roughly recapitulates the progress in the community so far. Unlike other books that focus on a single abstraction level such circuit level or system level alone, the focus of this book is to deal with the different reliability challenges across different levels starting from the physical level all the way to the system level (cross-layer approaches). The book aims at demonstrating how new hardware/software co-design solution can be proposed to ef-fectively mitigate reliability degradation such as transistor aging, processor variation, temperature effects, soft errors, etc. Provides readers with latest insights into novel, cross-layer methods and models with respect to dependability of embedded systems; Describes cross-layer approaches that can leverage reliability through techniques that are pro-actively designed with respect to techniques at other layers; Explains run-time adaptation and concepts/means of self-organization, in order to achieve error resiliency in complex, future many core systems.




Service Availability


Book Description




Architecting Dependable Systems III


Book Description

As software systems become ubiquitous, the issues of dependability become more and more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that dependability is addressed at the architectural level. This book comes as a result of an effort to bring together the research communities of software architectures and dependability. This state-of-the-art survey contains 16 carefully selected papers originating from the Twin Workshops on Architecting Dependable Systems (WADS 2004) accomplished as part of the International Conference on Software Engineering (ICSE 2004) in Edinburgh, UK and of the International Conference on Dependable Systems and Networks (DSN 2004) in Florence, Italy. The papers are organised in topical sections on architectures for dependable services, monitoring and reconfiguration in software architectures, dependability support for software architectures, architectural evaluation, and architectural abstractions for dependability.




Embedded Software


Book Description

With the omnipresence of micro devices in our daily lifes embedded software has gained tremendous importance in both science and industry. This volume contains 34 invited papers from the First International Workshop on Embedded Systems. They present latest research results from different areas of computer science that are traditionally distinct but relevant to embedded software development (such as, for example, component based design, functional programming, real-time Java, resource and storage allocation, verification). Each paper focuses on one topic, showing the inter-relationship and application to the design and implementation of embedded software systems.




Embedded Systems Handbook


Book Description

Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area of computer engineering with a currently appropriate emphasis on developments in networking and applications. Those experts directly involved in the creation and evolution of the ideas and technologies presented offer tutorials, research surveys, and technology overviews that explore cutting-edge developments and deployments and identify potential trends. This second self-contained volume of the handbook, Network Embedded Systems, focuses on select application areas. It covers automotive field, industrial automation, building automation, and wireless sensor networks. This volume highlights implementations in fast-evolving areas which have not received proper coverage in other publications. Reflecting the unique functional requirements of different application areas, the contributors discuss inter-node communication aspects in the context of specific applications of networked embedded systems. Those looking for guidance on preliminary design of embedded systems should consult the first volume: Embedded Systems Design and Verification.




Computer Safety, Reliability, and Security


Book Description

This book constitutes the proceedings of the 29th International Conference on Computer Safety, Reliability, and Security held in Vienna, Austria in September 2010.