- Publication:Dixit11a
|document=Document for Publication-Dixit11a.pdf
...e been proposed. In this paper we describe Adaptare - a complete framework for dependable QoS adaptation. We assume that during its lifetime, a system alt
2 KB (279 words) - 17:36, 21 January 2013
- Publication:Brandao2012reliabilityJBCS
|document=Document for Publication-Brandao2012reliabilityJBCS.pdf
...echniques alone, but possible when they are combined. We advocate the need for thorougher system models, by showing vulnerabilities arising from incomplet
1 KB (201 words) - 15:37, 23 January 2013
- Publication:Craveiro12sapient
|document=Document for Publication-Craveiro12sapient.pdf
|title=Scheduling Analysis Principles and Tool for Time- and Space-Partitioned Systems
1 KB (141 words) - 14:34, 3 December 2012
- Publication:Air-final-report
...f modifications to be introduced in the RTEMS application production chain for the implementation of AIR-based systems (exemplified through a proof of con
2 KB (224 words) - 13:00, 15 January 2013
- Publication:Air-summary-report
...ization of RTEMS, the Real-Time Executive for Multiprocessor Systems. This document addresses: (i) the AIR architecture specification; (ii) the AIR support to
1 KB (151 words) - 13:01, 15 January 2013
- Publication:Craveiro12hssim
|document=Document for Publication-Craveiro12hssim.pdf
|booktitle=3rd International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS 2012)
1 KB (203 words) - 14:59, 3 December 2012
- Publication:Cogo12MSc
|document=PEI-Cogo12MSc.pdf
... group properties supported by cloud providers or tools, and opportunities for cloud computing players contribute with diversity management area.
2 KB (330 words) - 15:12, 17 January 2013
- Publication:Joaosousa2011
|document=Document for Publication-joaosousa2011.pdf
|abstract=We present a new algorithm for state machine replication that is built around a leader-driven consensus pr
995 B (129 words) - 10:49, 21 January 2013
- Publication:Joaosousa2010
|document=Document for Publication-joaosousa2010.pdf
...n, and also show expected values of latency in the state transfer protocol for states different sizes. Finally, as far as we know, this work is the first
2 KB (269 words) - 10:49, 21 January 2013
- Publication:CostaPBC11
|document=CostaPBC11.pdf
...on Byzantine fault-tolerance paradigms. We believe this cost is acceptable for critical applications that require that level of fault tolerance.
1 KB (184 words) - 15:42, 21 January 2013
- Publication:Correia2012:CoC
|document=Document for Publication-Correia2012-CoC.pdf
|abstract=MapReduce is a framework for processing large data sets largely used in cloud computing. MapReduce imple
1 KB (169 words) - 15:31, 21 January 2013
- Publication:PedroCosta 2013
|document=Document for Publication-PedroCosta 2013.pdf
|abstract=MapReduce is often used for critical data processing, e.g., in the context of scientific or financial s
1 KB (151 words) - 18:33, 31 January 2013
- Publication:Padhy2011MiddlewarePoster
|document=Document for Publication-Padhy2011MiddlewarePoster.pdf
|title=Trustworthy and resilient monitoring system for cloud infrastructures
1 KB (153 words) - 17:37, 21 January 2013
- Publication:Dixit2012SAC
|document=Document for Publication-Dixit2012SAC.pdf
|abstract=Algorithms for solving distributed systems problems often use timeouts as a means to achie
2 KB (265 words) - 17:36, 21 January 2013
- Publication:Kreutz2012DAIS
|document=Document for Publication-Kreutz2012DAIS.pdf
|title=A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures
1 KB (160 words) - 17:43, 21 January 2013
- Publication:Nezhad2012DSN-FA
|document=Document for Publication-Nezhad2012DSN-FA.pdf
|title=A Multi-Layered Architecture for a Secure Virtualization Environment
1 KB (146 words) - 18:48, 21 January 2013
- Publication:Garcia msc11
|document=Document for Publication-garcia msc11.pdf
... vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OS.
2 KB (314 words) - 17:48, 2 October 2018
- Publication:Casimiro2012DCDV
|document=Document for Publication-Casimiro2012DCDV.pdf
|abstract=Cloud infrastructures play an increasingly important role for telecom operators, because they enable internal consolidation of resources
2 KB (264 words) - 18:21, 21 January 2013
- Publication:Garcia12 diversity
|document=Document for Publication-garcia12 diversity.pdf
2 KB (225 words) - 18:29, 21 January 2013
- Publication:Marques2012ASCOMS
|document=Document for Publication-Marques2012ASCOMS.pdf
1 KB (207 words) - 18:40, 21 January 2013
- Publication:Casimiro2012SSS
|document=Document for Publication-Casimiro2012SSS.pdf
|title=Brief Announcement: KARYON: Towards Safety Kernels for Cooperative Vehicular Systems
2 KB (267 words) - 11:51, 5 February 2013
- Publication:Araujo2012MGC
|document=Document for Publication-Araujo2012MGC.pdf
|title=Replication for dependability on virtualized cloud environments
2 KB (245 words) - 19:06, 21 January 2013
- Publication:Verissimo12tclouds
|document=Document for Publication-verissimo12tclouds.pdf
the same basic components, for example, intrusion-tolerant
1 KB (136 words) - 14:53, 28 January 2013
- Publication:Rosa11INDIN
|document=Document for Publication-Rosa11INDIN.pdf
...stem applications at execution time. In this paper we present an algorithm for update application schedules, showing results from the proof-of-concept pro
1 KB (181 words) - 17:10, 29 January 2013
- Publication:Veronese13FTolerance
|document=Document for Publication-Veronese13FTolerance.pdf
...utions the two algorithms run in the minimum number of communication steps for
1 KB (203 words) - 15:10, 26 February 2013
- Publication:Couto13Benchmarking
|document=Document for Publication-Couto13Benchmarking.pdf
|abstract=The increasing use of productivity and impact metrics for evaluation
2 KB (248 words) - 14:37, 11 March 2013
- Publication:Cogo13fitch
|document=Document for Publication-Cogo13fitch.pdf
...ice replicas closer to their clients, obtain diversity in the replication (for resilience), recover compromised replicas, or rejuvenate ageing replicas. W
2 KB (230 words) - 12:22, 9 August 2013
- Publication:BFT-TO
|document=Document for Publication-BFT-TO.pdf
... by replicating them in sets of servers. There have been several proposals for using SMR to tolerate arbitrary or Byzantine faults, including intrusions.
1 KB (163 words) - 14:21, 19 June 2013
- Publication:Kreutz13SDN
|document=Document for Publication-Kreutz13SDN.pdf
...ovides new ways to solve long-standing problems in networking --- routing, for instance --- while simultaneously allowing the use of security and dependab
2 KB (245 words) - 11:29, 27 June 2013
- Publication:Craveiro13laxity
|document=Document for Publication-Craveiro13laxity.pdf
815 B (113 words) - 13:21, 1 April 2017
- Publication:Malichevskyy15MSc
|document=Document for Publication-Malichevskyy15MSc.pdf
...the last years has created the demand for authentication and authorization for these networks. The basic model usually requires a user, to access the netw
2 KB (317 words) - 22:56, 11 July 2013
- Publication:Craveiro13umpr
|document=Document for Publication-Craveiro13umpr.pdf
...ource model; (iii) component abstraction guidelines to select the platform for the UMPR interface. We also briefly describe how we are dealing with the r
1 KB (196 words) - 13:22, 1 April 2017
- Publication:Atc13-durability
|document=Usenix13-dsmr.pdf
|abstract=State Machine Replication (SMR) is a fundamental tech- nique for ensuring the dependability of critical services in modern internet-scale in
1 KB (215 words) - 17:04, 17 July 2014
- Publication:NobregaDaCosta13safety
|document=Document for Publication-NobregaDaCosta13safety.pdf
|title=Safety Kernel for Cooperative Sensor-Based Systems
2 KB (292 words) - 08:33, 13 August 2013
- Publication:JSouza2013-LCN
|document=Document for Publication-JSouza2013-LCN.pdf
...d on the analytical model, which is being integrated in the NS-2 simulator for validation. Reducing network inaccessibility is a crucial step to enable th
2 KB (208 words) - 12:09, 23 May 2015
- Publication:Botelho2014ewsdn
|document=Document for Publication-Botelho2014ewsdn.pdf
..., and materialize it by proposing and formalizing a practical architecture for small to medium-sized networks. A central component of our design is a repl
1 KB (218 words) - 01:48, 23 July 2015
- Publication:JSouza2013-ECRTS
|document=Document for Publication-JSouza2013-ECRTS.pdf
...less network standards, providing a set of fundamental abstractions useful for both system design and application programming.
1 KB (168 words) - 10:51, 29 May 2015
- Publication:Marques2013:a
|document=SRDS-2013-Marques.pdf
... coordination, etc.) this problem cannot be ignored. Accordingly, we argue for, and show the efficacy of, using probabilistic models to characterize dynam
2 KB (214 words) - 12:20, 20 November 2013
- Publication:Casimiro2013karyon
|document=Casimiro2013karyon.pdf
...KARYON contributions include improved simulation and fault-injection tools for evaluating safety assurance according to the ISO 26262 safety standard. The
2 KB (304 words) - 11:23, 1 April 2017
- Publication:Alves2013
|document=Alves2013.pdf
|title=Middleware Support for Adaptive Real-Time Applications in Wireless Sensor Networks
1 KB (148 words) - 12:39, 20 November 2013
- Publication:Jesus2013
|document=Jesus2013.pdf
...o external disturbances affecting data accuracy. In this paper we motivate for the need of dependable data collection in harsh coastal and marine environm
1 KB (188 words) - 12:45, 20 November 2013
- Publication:AGuerreio2013-INFORUM
|document=Document for Publication-AGuerreio2013-INFORUM.pdf
|title=Improving NS-2 Network Simulator for IEEE 802.15.4 Standard Operation
1 KB (190 words) - 10:43, 29 May 2015
- Publication:AGUEREIRO-2014-SENSORNETS
|document=Document for Publication-AGUEREIRO-2014-SENSORNETS.pdf
1 KB (161 words) - 02:20, 23 July 2015
- Publication:Almeida2013Inforum
|document=Document for Publication-Almeida2013Inforum.pdf
This paper addresses the definition and design of fault-detection mechanisms for TSP hypervisors, covering both time and space domains. In spite of our focu
1 KB (159 words) - 13:18, 1 April 2017
- Publication:SP13:eBiobanking
|document=Document for Publication-SP13-eBiobanking.pdf
386 B (48 words) - 16:18, 21 January 2014
- Publication:Craveiro13PhD
|document=Document for Publication-Craveiro13PhD.pdf
...a compromise with size, weight and power consumption (SWaP), and open room for supporting self-adaptive behavior. To allow applying our results to a more
2 KB (355 words) - 13:28, 17 February 2015
- Publication:JsouzaRTN14
|document=Document for Publication-JsouzaRTN14.pdf
|title=Low Level Error Detection For Real-Time Wireless Communications
2 KB (225 words) - 02:00, 23 July 2015
- Publication:RCPinto2014rv
|document=Document for Publication-RCPinto2014rv.pdf
... handling deviations from specification. Although this approach is fitting for some domains, it can have a nefarious influence in embedded real-time syste
2 KB (210 words) - 11:50, 23 July 2014
- Publication:Cogo14biobank
|document=Publication-Cogo14biobankPoster.pdf
|title=BiobankCloud - Platform as a Service for Biobanking
1 KB (160 words) - 14:48, 22 April 2016
- Publication:Sousa2013wan-evaluation
|document=Document for Publication-Sousa2013wan-evaluation.pdf
857 B (110 words) - 15:51, 16 January 2017
- Publication:Bessani14scfs
|document=Publication-Bessani14scfs.pdf
...nities inherent in the current cloud services through a set of novel ideas for cloud-backed file systems: always write and avoid reading, modular coordina
1 KB (168 words) - 02:01, 23 July 2015
- Publication:Kreutz2014DSNFA
|document=Kreutz2014DSN FA.pdf
|title=Anchors of Trust for Autonomic and Secure Configuration and Assessment in SDN
520 B (70 words) - 11:51, 23 July 2014
- Publication:Sousa2014bft-smart
|document=Document for Publication-Sousa2014bft-smart.pdf
|title=State Machine Replication for the Masses with BFT-SMART
1 KB (171 words) - 02:11, 23 July 2015
- Publication:Sousa2011bft-smart
|document=Document for Publication-Sousa2011bft-smart.pdf
1 KB (152 words) - 18:07, 17 July 2014
- Publication:Sousa2012poster bftsmart
|document=Document for Publication-Sousa2012poster bftsmart.pdf
|title=... And StateMachine Replication for All with BFT-SMaRt
3 KB (409 words) - 19:27, 17 July 2014
- Publication:Sousa2014sbrc
|document=Document for Publication-Sousa2014sbrc.pdf
...The last fifteen years have seen an impressive amount of work on protocols for Byzantine fault-tolerant (BFT) state machine replication (SMR). However, th
895 B (122 words) - 02:23, 23 July 2015
- Publication:Bessani2012tutorial
|document=Document for Publication-bessani2012tutorial.pdf
605 B (78 words) - 16:27, 18 July 2014
- Publication:Bessani2014tutorial
|document=Document for Publication-bessani2014tutorial.pdf
...some prominent applications for SMR and an example of the real code needed for implementing a dependable service using the BFT-SMART replication library.
1 KB (147 words) - 02:24, 23 July 2015
- Publication:Garcia13diversity
|document=Document for Publication-garcia13diversity.pdf
|title=Analysis of OS Diversity for Intrusion Tolerance
1 KB (213 words) - 14:33, 23 July 2014
- Publication:Garcia13siem
|document=Document for Publication-garcia13siem.pdf
|title=An intrusion-tolerant firewall design for protecting SIEM systems
2 KB (244 words) - 10:43, 22 July 2014
- Publication:RaptorQ-SP2014
|document=Document for Publication-RaptorQ-SP2014.pdf
so far. Its properties make it attractive for forward error
1 KB (200 words) - 08:08, 5 June 2016
- Publication:WAP-WWW2014
|document=Document for Publication-WAP-WWW2014.pdf
...sis) versus automatically obtaining that knowledge (with machine learning, for data mining). Given this more precise form of detection, we do automatic co
2 KB (246 words) - 08:08, 5 June 2016
- Publication:SmartMeter-INDIN2013
|document=Document for Publication-SmartMeter-INDIN2013.pdf
473 B (55 words) - 14:16, 23 July 2014
- Publication:SITAN-DSN2014
|document=Document for Publication-SITAN-DSN2014.pdf
|title=SITAN: Services for Ad Hoc Networks with Unknown Participants
1 KB (209 words) - 08:07, 5 June 2016
- Publication:WAP-DSN2014
|document=Document for Publication-WAP-DSN2014.pdf
for Internet applications. This involved changing from
1 KB (173 words) - 08:07, 5 June 2016
- Publication:ISD-INFORUM2014
|document=Document for Publication-ISD-INFORUM2014.pdf
2 KB (321 words) - 01:49, 23 July 2015
- Publication:Johansson2014erts2
|document=Document for Publication-Johansson2014erts2.pdf
...posed solutions are also fully in-line what is prescribed by the standards for functional safety of the two domains.
1 KB (210 words) - 11:21, 1 April 2017
- Publication:Casimiro2014sies-invited
|document=Document for Publication-Casimiro2014sies-invited.pdf
...en and uncertain environments is a challenging task. Traditional solutions for achieving safety either impose restrictions on performance or require costl
2 KB (226 words) - 12:14, 31 July 2014
- Publication:Martins2013Middleware
|document=Document for Publication-Martins2013Middleware.pdf
...veloped Hermes, a fault-injector framework that provides an infrastructure for injecting faults in a Byzantine fault-tolerant state machine. Our main goal
2 KB (246 words) - 08:55, 26 July 2014
- Publication:Casimiro2014ADSN
|document=Document for Publication-Casimiro2014ADSN.pdf
...ervice levels and we use the system architectural concept of safety kernel for managing the service level in order to achieve the best possible performanc
2 KB (269 words) - 02:10, 23 July 2015
- Publication:Araujo2014JISA
|document=Document for Publication-Araujo2014JISA.pdf
... be as unbalanced as possible. We systematically identify the best defense for each kind of failure and majority to preserve. We then review the most comm
2 KB (266 words) - 01:58, 23 July 2015
- Publication:Jesus2014HIC
|document=Document for Publication-Jesus2014HIC.pdf
...quatic sensors are vulnerable to external disturbances. Existing solutions for aquatic monitoring composed by heterogeneous sensors are unable to ensure c
1 KB (193 words) - 01:57, 23 July 2015
- Publication:Vial2014ASCoMS
|document=Document for Publication-Vial2014ASCoMS.pdf
...onditions concerning data quality and timeliness that need to be satisfied for the system to operate safely in each operation mode.
2 KB (241 words) - 01:52, 23 July 2015
- Publication:ETeixeiraMs07
|document=Document for Publication-ETeixeiraMs07.pdf
2 KB (330 words) - 17:51, 2 October 2018
- Publication:LIP6928
|document=Document for Publication-LIP6928.pdf
591 B (73 words) - 12:58, 16 October 2014
- Publication:Oliveira2014DIHC
|document=Oliveira2014DIHC.pdf
...valent data sharing features in different clouds, an important requirement for implementing secure multi-cloud systems.
1 KB (160 words) - 01:55, 23 July 2015
- Publication:Jesus2015tese
|document=Document for Publication-Jesus2015tese.pdf
|title=Privacy Preserving Protocols for Smart Meters and Electric Vehicles
3 KB (426 words) - 17:42, 2 October 2018
- Publication:IEEETR15
|document=Document for Publication-IEEETR15.pdf
on for more than a decade, the security of web applications
2 KB (261 words) - 07:47, 5 June 2016
- Publication:Consistency15
|document=papoc15-composite.pdf
composition of a number of cloud services for improving
1 KB (205 words) - 02:27, 23 July 2015
- Publication:EDC15
|document=EuroSys15-edc.pdf
...stributed queue by more than an order of magnitude (17x for ZooKeeper, 24x for DepSpace) while keeping the underlying coordination kernel small.
2 KB (211 words) - 01:32, 23 July 2015
- Publication:Souza2014SIGBED
|document=Document for Publication-Souza2014SIGBED.pdf
|title=The Wi-STARK Architecture For Resilient Real-Time Wireless Communications
2 KB (222 words) - 01:44, 23 July 2015
- Publication:Pinto2014EWiLi14-Poster
|document=Document for Publication-Pinto2014EWiLi14-Poster.pdf
1 KB (133 words) - 08:26, 5 April 2017
- Publication:Souza2014WiEEE
|document=Document for Publication-Souza2014WiEEE.pdf
for the WnS and how those can be used to support low level
2 KB (244 words) - 01:39, 23 July 2015
- Publication:Guerreiro2014MScThesis
|document=Document for Publication-Guerreiro2014MScThesis.pdf
... IEEE 802.15.4 simulation model. These improvements comprises: the support for real-time transmissions, through the incorporation of the contention free p
3 KB (356 words) - 13:54, 29 May 2015
- Publication:Carraca2014INForum
|document=Document for Publication-Carraca2014INForum.pdf
|title=Information Security in Time- and Space-Partitioned Architectures for Aerospace Systems
1 KB (166 words) - 01:40, 23 July 2015
- Publication:Pinto2014INForum
|document=Pinto2014INForum.pdf
...ion (RV). Traditional RV techniques require the intrumentation of the code for monitoring, which brings an overhead to the
1 KB (169 words) - 02:26, 23 July 2015
- Publication:A Tool for Real-Time Assessment of IEEE 802.15.4 Networks Through Fault Injection
|document=Document for Publication-A Tool for Real-Time Assessment of IEEE 802.15.4 Networks Through Fault Injection.pdf
|title=A Tool for Real-Time Assessment of IEEE 802.15.4 Networks Through Fault Injection
2 KB (333 words) - 06:17, 2 April 2017
- Publication:Sousa2015wheat
|document=Document for Publication-Sousa2015wheat.pdf
|title=Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines
2 KB (247 words) - 08:14, 9 August 2015
- Publication:Bessani2015biobankcloud-platform
|document=Document for Publication-Bessani2015biobankcloud-platform.pdf
|title=BiobankCloud: a Platform for the Secure Storage, Sharing, and Processing of Large Biomedical Data Sets
2 KB (307 words) - 14:27, 30 July 2015
- Publication:Onica2015MSI
|document=Document for Publication-Onica2015MSI.pdf
power grid. This brings several advantages, allowing for a faster and more efficient
2 KB (349 words) - 17:43, 2 October 2018
- Publication:Alves2015MEng
|document=Document for Publication-Alves2015MEng.pdf
is used for both power supply and network connection. PLC can be employed in
2 KB (373 words) - 17:43, 2 October 2018
- Publication:Onica15PTP
|document=Document for Publication-Onica15PTP.pdf
|title=Fault-Tolerant Precision Time Protocol for Smart Grids
1 KB (188 words) - 08:09, 9 August 2015
- Publication:Vavala15SRDS
|document=Document for Publication-Vavala15SRDS.pdf
1 KB (137 words) - 08:14, 9 August 2015
- Publication:Medeiros2015tese
|document=Document for Publication-Medeiros2015tese.pdf
|title=Secure Monitoring for a Secure Smart Grid
2 KB (334 words) - 16:33, 2 October 2018
- Publication:Caldeira2015Extreme
|document=Document for Publication-Caldeira2015Extreme.pdf
|title=Methods and Tools for Assessment of Wireless Networks in Extreme Environments
2 KB (296 words) - 07:50, 5 April 2017
- Publication:Semedo2014LoadBalancingSDN
|document=Document for Publication-Semedo2014LoadBalancingSDN.pdf
...pose a Multi-Algorithm Load Balancer (MALOB), a load balancing application for SDNs that has the capability to adapt to the different types of requests, s
3 KB (433 words) - 17:46, 2 October 2018
- Publication:Alaluna2015NetVirt
|document=Document for Publication-Alaluna2015NetVirt.pdf
2 KB (244 words) - 07:35, 5 June 2016
- Publication:Cogo2016integration
|document=Document for Publication-cogo2016integration.pdf
1 KB (146 words) - 13:50, 26 January 2016
- Publication:Mest FabioPereira Set17
|document=Document for Publication-Mest FabioPereira Set17.pdf
...ch-based alternatives have been shown to achieve higher levels of accuracy for the same cost. Existing switches, however, lack the necessary
3 KB (383 words) - 19:05, 24 February 2018
- Publication:Cogo2016efficient
|document=Document for Publication-Cogo2016efficient.pdf
...s efficiently may accelerate medical breakthroughs, but augments the risks for donors' privacy. The million-scale size and criticality of sets of genomes
1 KB (166 words) - 22:18, 13 November 2016