New Results in Dependability and Computer Systems, 1st Edition

  • Published By:
  • ISBN-10: 3319009451
  • ISBN-13: 9783319009452
  • DDC: 004
  • Grade Level Range: College Freshman - College Senior
  • 554 Pages | eBook
  • Original Copyright 2013 | Published/Released June 2014
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



DepCoS – RELCOMEX is an annual series of conferences organized by the Institute of Computer Engineering, Control and Robotics (CECR), Wrocław University of Technology, since 2006. Its idea came from the heritage of the other two cycles of events: RELCOMEX Conferences (1977 – 89) and Microcomputer Schools (1985 – 95) which were then organized by the Institute of Engineering Cybernetics, the previous name of CECR. In contrast to those preceding meetings focused on the conventional reliability analysis, the DepCoS mission is to develop a more comprehensive approach to computer system performability, which is now commonly called dependability. Contemporary technical systems are integrated unities of technical, information, organization, software and human resources. Diversity of the processes being realized in the system, their concurrency and their reliance on in-system intelligence significantly impedes construction of strict mathematical models and calls for application of intelligent and soft computing methods. The submissions included in this volume illustrate variety of problems that need to be explored in the dependability analysis: methodologies and practical tools for modeling, design and simulation of the systems, security and confidentiality in information processing, specific issues of heterogeneous, today often wireless, computer networks, or management of transportation networks.

Table of Contents

Front Cover.
Other Frontmatter.
Title Page.
Copyright Page.
Eight International Conference on Dependability and Complex Systems DepCoS-RELCOMEX.
1: Application Level Execution Model for Transparent Distributed Computing.
2: Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case.
3: Risk Assessment Aspects in Mastering the Value Function of Security Measures.
4: Reduction of Computational Cost in Mutation Testing by Sampling Mutants.
5: Use of Neural Network Algorithms in Prediction of XLPE HV Insulation Properties under Thermal Aging.
6: Computer Simulation Analysis of Cluster Model of Totally-Connected Flows on the Chain Mail*.
7: Assessment of Network Coding Mechanism for the Network Protocol Stack 802.15.4/6LoWPAN.
8: Reliability Analysis of Discrete Transportation Systems Using Critical States.
9: A Reference Model for the Selection of Open Source Tools for Requirements Management.
10: A Probabilistic Approach to the Count-To- Infinity Problem in Distance-Vector Routing Algorithms.
11: A Quality Estimation of Mutation Clustering in C# Programs.
12: Using Virtualization Technology for Fault-Tolerant Replication in LAN.
13: Quantification of Simultaneous-AND Gates in Temporal Fault Trees.
14: Improving of Non-Interactive Zero-Knowledge Arguments Using Oblivious Transfer.
15: Virtual Environment for Implementation and Testing Private Wide Area Network Solutions.
16: Optimization of Privacy Preserving Mechanisms in Mining Continuous Patterns.
17: Technical and Program Aspects on Monitoring of Highway Flows (Case Study of Moscow City).
18: Integral Functionals of semi-Markov Processes in Reliability Problems.
19: Generating Repair Rules for Database Integrity Maintenance.
20: Optimization Algorithm for the Preservation of Sensor Coverage.
21: Methods for Detecting and Analyzing Hidden FAT32 Volumes Created with the Use of Cryptographic Tools.
22: Critical Infrastructures Safety Assessment Combining Fuzzy Models and Bayesian Belief Network under Uncertainties.
23: Towards Evolution Methodology for Service-Oriented Systems.
24: The LVA-Index in Clustering.
25: Three Different Approaches in Pedestrian Dynamics Modeling - A Case Study.
26: The End-To-End Rate Adaptation Application for Real-Time Video Monitoring.
27: Discrete Transportation Systems Quality Performance Analysis by Critical States Detection.
28: An Expanded Concept of the Borrowed Time as a Mean of Increasing the Average Speed Isotropy on Regular Grids.
29: Freshness Constraints in the RT Framework.
30: Transformational Modeling of BPMN Business Process in SOA Context*.
31: Algorithmic and Information Aspects of the Generalized Transportation Problem for Linear Objects on a Two Dimensional Lattice.
32: Reliability Assessment of Supporting Satellite System EGNOS.
33: Vbam - Byzantine Atomic Multicast in LAN Based on Virtualization Technology.
34: An Approach to Automated Verification of Multi-Level Security System Models.
35: A Web Service-Based Platform for Distributed Web Applications Integration.
36: Universal Platform for Composite Data Stream Processing Services Management.
37: Proposal of Cost-Effective Tenant-Based Resource Allocation Model for a SaaS System.
38: Automatic Load Testing of Web Application in SaaS Model.
39: Implementing Salsa20 vs. AES and Serpent Ciphers in Popular-Grade FPGA Devices.
40: On Testing Wireless Sensor Networks.
41: Towards Precise Architectural Decision Models.
42: Slot Selection Algorithms for Economic Scheduling in Distributed Computing with High QoS Rates.
43: K-Induction Based Verification of Real-Time Safety Critical Systems.
44: Native Support for Modbus RTU Protocol in Snort Intrusion Detection System.
45: SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns.
46: System for Estimation of Patient's State – Discussion of the Approach.
47: Dependability Aspects of Autonomic Cooperative Computing Systems.
48: Life Cycle Cost through Reliability.
49: Verification of Infocommunication System Components for Modeling and Control of Saturated Traffic in Megalopolis*.
50: Shuffle-Based Verification of Component Compatibility.
Author Index.