Search results

From Navigators

Jump to: navigation, search

  • Publication:Dixit11a
    |document=Document for Publication-Dixit11a.pdf ...e been proposed. In this paper we describe Adaptare - a complete framework for dependable QoS adaptation. We assume that during its lifetime, a system alt
    2 KB (279 words) - 17:36, 21 January 2013
  • Publication:Brandao2012reliabilityJBCS
    |document=Document for Publication-Brandao2012reliabilityJBCS.pdf ...echniques alone, but possible when they are combined. We advocate the need for thorougher system models, by showing vulnerabilities arising from incomplet
    1 KB (201 words) - 15:37, 23 January 2013
  • Publication:Craveiro12sapient
    |document=Document for Publication-Craveiro12sapient.pdf |title=Scheduling Analysis Principles and Tool for Time- and Space-Partitioned Systems
    1 KB (141 words) - 14:34, 3 December 2012
  • Publication:Air-final-report
    ...f modifications to be introduced in the RTEMS application production chain for the implementation of AIR-based systems (exemplified through a proof of con
    2 KB (224 words) - 13:00, 15 January 2013
  • Publication:Air-summary-report
    ...ization of RTEMS, the Real-Time Executive for Multiprocessor Systems. This document addresses: (i) the AIR architecture specification; (ii) the AIR support to
    1 KB (151 words) - 13:01, 15 January 2013
  • Publication:Craveiro12hssim
    |document=Document for Publication-Craveiro12hssim.pdf |booktitle=3rd International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS 2012)
    1 KB (203 words) - 14:59, 3 December 2012
  • Publication:Cogo12MSc
    |document=PEI-Cogo12MSc.pdf ... group properties supported by cloud providers or tools, and opportunities for cloud computing players contribute with diversity management area.
    2 KB (330 words) - 15:12, 17 January 2013
  • Publication:Joaosousa2011
    |document=Document for Publication-joaosousa2011.pdf |abstract=We present a new algorithm for state machine replication that is built around a leader-driven consensus pr
    995 B (129 words) - 10:49, 21 January 2013
  • Publication:Joaosousa2010
    |document=Document for Publication-joaosousa2010.pdf ...n, and also show expected values of latency in the state transfer protocol for states different sizes. Finally, as far as we know, this work is the first
    2 KB (269 words) - 10:49, 21 January 2013
  • Publication:CostaPBC11
    |document=CostaPBC11.pdf ...on Byzantine fault-tolerance paradigms. We believe this cost is acceptable for critical applications that require that level of fault tolerance.
    1 KB (184 words) - 15:42, 21 January 2013
  • Publication:Correia2012:CoC
    |document=Document for Publication-Correia2012-CoC.pdf |abstract=MapReduce is a framework for processing large data sets largely used in cloud computing. MapReduce imple
    1 KB (169 words) - 15:31, 21 January 2013
  • Publication:PedroCosta 2013
    |document=Document for Publication-PedroCosta 2013.pdf |abstract=MapReduce is often used for critical data processing, e.g., in the context of scientific or financial s
    1 KB (151 words) - 18:33, 31 January 2013
  • Publication:Padhy2011MiddlewarePoster
    |document=Document for Publication-Padhy2011MiddlewarePoster.pdf |title=Trustworthy and resilient monitoring system for cloud infrastructures
    1 KB (153 words) - 17:37, 21 January 2013
  • Publication:Dixit2012SAC
    |document=Document for Publication-Dixit2012SAC.pdf |abstract=Algorithms for solving distributed systems problems often use timeouts as a means to achie
    2 KB (265 words) - 17:36, 21 January 2013
  • Publication:Kreutz2012DAIS
    |document=Document for Publication-Kreutz2012DAIS.pdf |title=A Trustworthy and Resilient Event Broker for Monitoring Cloud Infrastructures
    1 KB (160 words) - 17:43, 21 January 2013
  • Publication:Nezhad2012DSN-FA
    |document=Document for Publication-Nezhad2012DSN-FA.pdf |title=A Multi-Layered Architecture for a Secure Virtualization Environment
    1 KB (146 words) - 18:48, 21 January 2013
  • Publication:Garcia msc11
    |document=Document for Publication-garcia msc11.pdf ... vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OS.
    2 KB (314 words) - 17:48, 2 October 2018
  • Publication:Casimiro2012DCDV
    |document=Document for Publication-Casimiro2012DCDV.pdf |abstract=Cloud infrastructures play an increasingly important role for telecom operators, because they enable internal consolidation of resources
    2 KB (264 words) - 18:21, 21 January 2013
  • Publication:Garcia12 diversity
    |document=Document for Publication-garcia12 diversity.pdf
    2 KB (225 words) - 18:29, 21 January 2013
  • Publication:Marques2012ASCOMS
    |document=Document for Publication-Marques2012ASCOMS.pdf
    1 KB (207 words) - 18:40, 21 January 2013
  • Publication:Casimiro2012SSS
    |document=Document for Publication-Casimiro2012SSS.pdf |title=Brief Announcement: KARYON: Towards Safety Kernels for Cooperative Vehicular Systems
    2 KB (267 words) - 11:51, 5 February 2013
  • Publication:Araujo2012MGC
    |document=Document for Publication-Araujo2012MGC.pdf |title=Replication for dependability on virtualized cloud environments
    2 KB (245 words) - 19:06, 21 January 2013
  • Publication:Verissimo12tclouds
    |document=Document for Publication-verissimo12tclouds.pdf the same basic components, for example, intrusion-tolerant
    1 KB (136 words) - 14:53, 28 January 2013
  • Publication:Rosa11INDIN
    |document=Document for Publication-Rosa11INDIN.pdf ...stem applications at execution time. In this paper we present an algorithm for update application schedules, showing results from the proof-of-concept pro
    1 KB (181 words) - 17:10, 29 January 2013
  • Publication:Veronese13FTolerance
    |document=Document for Publication-Veronese13FTolerance.pdf ...utions the two algorithms run in the minimum number of communication steps for
    1 KB (203 words) - 15:10, 26 February 2013
  • Publication:Couto13Benchmarking
    |document=Document for Publication-Couto13Benchmarking.pdf |abstract=The increasing use of productivity and impact metrics for evaluation
    2 KB (248 words) - 14:37, 11 March 2013
  • Publication:Cogo13fitch
    |document=Document for Publication-Cogo13fitch.pdf ...ice replicas closer to their clients, obtain diversity in the replication (for resilience), recover compromised replicas, or rejuvenate ageing replicas. W
    2 KB (230 words) - 12:22, 9 August 2013
  • Publication:BFT-TO
    |document=Document for Publication-BFT-TO.pdf ... by replicating them in sets of servers. There have been several proposals for using SMR to tolerate arbitrary or Byzantine faults, including intrusions.
    1 KB (163 words) - 14:21, 19 June 2013
  • Publication:Kreutz13SDN
    |document=Document for Publication-Kreutz13SDN.pdf ...ovides new ways to solve long-standing problems in networking --- routing, for instance --- while simultaneously allowing the use of security and dependab
    2 KB (245 words) - 11:29, 27 June 2013
  • Publication:Craveiro13laxity
    |document=Document for Publication-Craveiro13laxity.pdf
    815 B (113 words) - 13:21, 1 April 2017
  • Publication:Malichevskyy15MSc
    |document=Document for Publication-Malichevskyy15MSc.pdf ...the last years has created the demand for authentication and authorization for these networks. The basic model usually requires a user, to access the netw
    2 KB (317 words) - 22:56, 11 July 2013
  • Publication:Craveiro13umpr
    |document=Document for Publication-Craveiro13umpr.pdf ...ource model; (iii) component abstraction guidelines to select the platform for the UMPR interface. We also briefly describe how we are dealing with the r
    1 KB (196 words) - 13:22, 1 April 2017
  • Publication:Atc13-durability
    |document=Usenix13-dsmr.pdf |abstract=State Machine Replication (SMR) is a fundamental tech- nique for ensuring the dependability of critical services in modern internet-scale in
    1 KB (215 words) - 17:04, 17 July 2014
  • Publication:NobregaDaCosta13safety
    |document=Document for Publication-NobregaDaCosta13safety.pdf |title=Safety Kernel for Cooperative Sensor-Based Systems
    2 KB (292 words) - 08:33, 13 August 2013
  • Publication:JSouza2013-LCN
    |document=Document for Publication-JSouza2013-LCN.pdf ...d on the analytical model, which is being integrated in the NS-2 simulator for validation. Reducing network inaccessibility is a crucial step to enable th
    2 KB (208 words) - 12:09, 23 May 2015
  • Publication:Botelho2014ewsdn
    |document=Document for Publication-Botelho2014ewsdn.pdf ..., and materialize it by proposing and formalizing a practical architecture for small to medium-sized networks. A central component of our design is a repl
    1 KB (218 words) - 01:48, 23 July 2015
  • Publication:JSouza2013-ECRTS
    |document=Document for Publication-JSouza2013-ECRTS.pdf ...less network standards, providing a set of fundamental abstractions useful for both system design and application programming.
    1 KB (168 words) - 10:51, 29 May 2015
  • Publication:Marques2013:a
    |document=SRDS-2013-Marques.pdf ... coordination, etc.) this problem cannot be ignored. Accordingly, we argue for, and show the efficacy of, using probabilistic models to characterize dynam
    2 KB (214 words) - 12:20, 20 November 2013
  • Publication:Casimiro2013karyon
    |document=Casimiro2013karyon.pdf ...KARYON contributions include improved simulation and fault-injection tools for evaluating safety assurance according to the ISO 26262 safety standard. The
    2 KB (304 words) - 11:23, 1 April 2017
  • Publication:Alves2013
    |document=Alves2013.pdf |title=Middleware Support for Adaptive Real-Time Applications in Wireless Sensor Networks
    1 KB (148 words) - 12:39, 20 November 2013
  • Publication:Jesus2013
    |document=Jesus2013.pdf ...o external disturbances affecting data accuracy. In this paper we motivate for the need of dependable data collection in harsh coastal and marine environm
    1 KB (188 words) - 12:45, 20 November 2013
  • Publication:AGuerreio2013-INFORUM
    |document=Document for Publication-AGuerreio2013-INFORUM.pdf |title=Improving NS-2 Network Simulator for IEEE 802.15.4 Standard Operation
    1 KB (190 words) - 10:43, 29 May 2015
  • Publication:AGUEREIRO-2014-SENSORNETS
    |document=Document for Publication-AGUEREIRO-2014-SENSORNETS.pdf
    1 KB (161 words) - 02:20, 23 July 2015
  • Publication:Almeida2013Inforum
    |document=Document for Publication-Almeida2013Inforum.pdf This paper addresses the definition and design of fault-detection mechanisms for TSP hypervisors, covering both time and space domains. In spite of our focu
    1 KB (159 words) - 13:18, 1 April 2017
  • Publication:SP13:eBiobanking
    |document=Document for Publication-SP13-eBiobanking.pdf
    386 B (48 words) - 16:18, 21 January 2014
  • Publication:Craveiro13PhD
    |document=Document for Publication-Craveiro13PhD.pdf ...a compromise with size, weight and power consumption (SWaP), and open room for supporting self-adaptive behavior. To allow applying our results to a more
    2 KB (355 words) - 13:28, 17 February 2015
  • Publication:JsouzaRTN14
    |document=Document for Publication-JsouzaRTN14.pdf |title=Low Level Error Detection For Real-Time Wireless Communications
    2 KB (225 words) - 02:00, 23 July 2015
  • Publication:RCPinto2014rv
    |document=Document for Publication-RCPinto2014rv.pdf ... handling deviations from specification. Although this approach is fitting for some domains, it can have a nefarious influence in embedded real-time syste
    2 KB (210 words) - 11:50, 23 July 2014
  • Publication:Cogo14biobank
    |document=Publication-Cogo14biobankPoster.pdf |title=BiobankCloud - Platform as a Service for Biobanking
    1 KB (160 words) - 14:48, 22 April 2016
  • Publication:Sousa2013wan-evaluation
    |document=Document for Publication-Sousa2013wan-evaluation.pdf
    857 B (110 words) - 15:51, 16 January 2017
  • Publication:Bessani14scfs
    |document=Publication-Bessani14scfs.pdf ...nities inherent in the current cloud services through a set of novel ideas for cloud-backed file systems: always write and avoid reading, modular coordina
    1 KB (168 words) - 02:01, 23 July 2015
  • Publication:Kreutz2014DSNFA
    |document=Kreutz2014DSN FA.pdf |title=Anchors of Trust for Autonomic and Secure Configuration and Assessment in SDN
    520 B (70 words) - 11:51, 23 July 2014
  • Publication:Sousa2014bft-smart
    |document=Document for Publication-Sousa2014bft-smart.pdf |title=State Machine Replication for the Masses with BFT-SMART
    1 KB (171 words) - 02:11, 23 July 2015
  • Publication:Sousa2011bft-smart
    |document=Document for Publication-Sousa2011bft-smart.pdf
    1 KB (152 words) - 18:07, 17 July 2014
  • Publication:Sousa2012poster bftsmart
    |document=Document for Publication-Sousa2012poster bftsmart.pdf |title=... And StateMachine Replication for All with BFT-SMaRt
    3 KB (409 words) - 19:27, 17 July 2014
  • Publication:Sousa2014sbrc
    |document=Document for Publication-Sousa2014sbrc.pdf ...The last fifteen years have seen an impressive amount of work on protocols for Byzantine fault-tolerant (BFT) state machine replication (SMR). However, th
    895 B (122 words) - 02:23, 23 July 2015
  • Publication:Bessani2012tutorial
    |document=Document for Publication-bessani2012tutorial.pdf
    605 B (78 words) - 16:27, 18 July 2014
  • Publication:Bessani2014tutorial
    |document=Document for Publication-bessani2014tutorial.pdf ...some prominent applications for SMR and an example of the real code needed for implementing a dependable service using the BFT-SMART replication library.
    1 KB (147 words) - 02:24, 23 July 2015
  • Publication:Garcia13diversity
    |document=Document for Publication-garcia13diversity.pdf |title=Analysis of OS Diversity for Intrusion Tolerance
    1 KB (213 words) - 14:33, 23 July 2014
  • Publication:Garcia13siem
    |document=Document for Publication-garcia13siem.pdf |title=An intrusion-tolerant firewall design for protecting SIEM systems
    2 KB (244 words) - 10:43, 22 July 2014
  • Publication:RaptorQ-SP2014
    |document=Document for Publication-RaptorQ-SP2014.pdf so far. Its properties make it attractive for forward error
    1 KB (200 words) - 08:08, 5 June 2016
  • Publication:WAP-WWW2014
    |document=Document for Publication-WAP-WWW2014.pdf ...sis) versus automatically obtaining that knowledge (with machine learning, for data mining). Given this more precise form of detection, we do automatic co
    2 KB (246 words) - 08:08, 5 June 2016
  • Publication:SmartMeter-INDIN2013
    |document=Document for Publication-SmartMeter-INDIN2013.pdf
    473 B (55 words) - 14:16, 23 July 2014
  • Publication:SITAN-DSN2014
    |document=Document for Publication-SITAN-DSN2014.pdf |title=SITAN: Services for Ad Hoc Networks with Unknown Participants
    1 KB (209 words) - 08:07, 5 June 2016
  • Publication:WAP-DSN2014
    |document=Document for Publication-WAP-DSN2014.pdf for Internet applications. This involved changing from
    1 KB (173 words) - 08:07, 5 June 2016
  • Publication:ISD-INFORUM2014
    |document=Document for Publication-ISD-INFORUM2014.pdf
    2 KB (321 words) - 01:49, 23 July 2015
  • Publication:Johansson2014erts2
    |document=Document for Publication-Johansson2014erts2.pdf ...posed solutions are also fully in-line what is prescribed by the standards for functional safety of the two domains.
    1 KB (210 words) - 11:21, 1 April 2017
  • Publication:Casimiro2014sies-invited
    |document=Document for Publication-Casimiro2014sies-invited.pdf ...en and uncertain environments is a challenging task. Traditional solutions for achieving safety either impose restrictions on performance or require costl
    2 KB (226 words) - 12:14, 31 July 2014
  • Publication:Martins2013Middleware
    |document=Document for Publication-Martins2013Middleware.pdf ...veloped Hermes, a fault-injector framework that provides an infrastructure for injecting faults in a Byzantine fault-tolerant state machine. Our main goal
    2 KB (246 words) - 08:55, 26 July 2014
  • Publication:Casimiro2014ADSN
    |document=Document for Publication-Casimiro2014ADSN.pdf ...ervice levels and we use the system architectural concept of safety kernel for managing the service level in order to achieve the best possible performanc
    2 KB (269 words) - 02:10, 23 July 2015
  • Publication:Araujo2014JISA
    |document=Document for Publication-Araujo2014JISA.pdf ... be as unbalanced as possible. We systematically identify the best defense for each kind of failure and majority to preserve. We then review the most comm
    2 KB (266 words) - 01:58, 23 July 2015
  • Publication:Jesus2014HIC
    |document=Document for Publication-Jesus2014HIC.pdf ...quatic sensors are vulnerable to external disturbances. Existing solutions for aquatic monitoring composed by heterogeneous sensors are unable to ensure c
    1 KB (193 words) - 01:57, 23 July 2015
  • Publication:Vial2014ASCoMS
    |document=Document for Publication-Vial2014ASCoMS.pdf ...onditions concerning data quality and timeliness that need to be satisfied for the system to operate safely in each operation mode.
    2 KB (241 words) - 01:52, 23 July 2015
  • Publication:ETeixeiraMs07
    |document=Document for Publication-ETeixeiraMs07.pdf
    2 KB (330 words) - 17:51, 2 October 2018
  • Publication:LIP6928
    |document=Document for Publication-LIP6928.pdf
    591 B (73 words) - 12:58, 16 October 2014
  • Publication:Oliveira2014DIHC
    |document=Oliveira2014DIHC.pdf ...valent data sharing features in different clouds, an important requirement for implementing secure multi-cloud systems.
    1 KB (160 words) - 01:55, 23 July 2015
  • Publication:Jesus2015tese
    |document=Document for Publication-Jesus2015tese.pdf |title=Privacy Preserving Protocols for Smart Meters and Electric Vehicles
    3 KB (426 words) - 17:42, 2 October 2018
  • Publication:IEEETR15
    |document=Document for Publication-IEEETR15.pdf on for more than a decade, the security of web applications
    2 KB (261 words) - 07:47, 5 June 2016
  • Publication:Consistency15
    |document=papoc15-composite.pdf composition of a number of cloud services for improving
    1 KB (205 words) - 02:27, 23 July 2015
  • Publication:EDC15
    |document=EuroSys15-edc.pdf ...stributed queue by more than an order of magnitude (17x for ZooKeeper, 24x for DepSpace) while keeping the underlying coordination kernel small.
    2 KB (211 words) - 01:32, 23 July 2015
  • Publication:Souza2014SIGBED
    |document=Document for Publication-Souza2014SIGBED.pdf |title=The Wi-STARK Architecture For Resilient Real-Time Wireless Communications
    2 KB (222 words) - 01:44, 23 July 2015
  • Publication:Pinto2014EWiLi14-Poster
    |document=Document for Publication-Pinto2014EWiLi14-Poster.pdf
    1 KB (133 words) - 08:26, 5 April 2017
  • Publication:Souza2014WiEEE
    |document=Document for Publication-Souza2014WiEEE.pdf for the WnS and how those can be used to support low level
    2 KB (244 words) - 01:39, 23 July 2015
  • Publication:Guerreiro2014MScThesis
    |document=Document for Publication-Guerreiro2014MScThesis.pdf ... IEEE 802.15.4 simulation model. These improvements comprises: the support for real-time transmissions, through the incorporation of the contention free p
    3 KB (356 words) - 13:54, 29 May 2015
  • Publication:Carraca2014INForum
    |document=Document for Publication-Carraca2014INForum.pdf |title=Information Security in Time- and Space-Partitioned Architectures for Aerospace Systems
    1 KB (166 words) - 01:40, 23 July 2015
  • Publication:Pinto2014INForum
    |document=Pinto2014INForum.pdf ...ion (RV). Traditional RV techniques require the intrumentation of the code for monitoring, which brings an overhead to the
    1 KB (169 words) - 02:26, 23 July 2015
  • Publication:A Tool for Real-Time Assessment of IEEE 802.15.4 Networks Through Fault Injection
    |document=Document for Publication-A Tool for Real-Time Assessment of IEEE 802.15.4 Networks Through Fault Injection.pdf |title=A Tool for Real-Time Assessment of IEEE 802.15.4 Networks Through Fault Injection
    2 KB (333 words) - 06:17, 2 April 2017
  • Publication:Sousa2015wheat
    |document=Document for Publication-Sousa2015wheat.pdf |title=Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines
    2 KB (247 words) - 08:14, 9 August 2015
  • Publication:Bessani2015biobankcloud-platform
    |document=Document for Publication-Bessani2015biobankcloud-platform.pdf |title=BiobankCloud: a Platform for the Secure Storage, Sharing, and Processing of Large Biomedical Data Sets
    2 KB (307 words) - 14:27, 30 July 2015
  • Publication:Onica2015MSI
    |document=Document for Publication-Onica2015MSI.pdf power grid. This brings several advantages, allowing for a faster and more efficient
    2 KB (349 words) - 17:43, 2 October 2018
  • Publication:Alves2015MEng
    |document=Document for Publication-Alves2015MEng.pdf is used for both power supply and network connection. PLC can be employed in
    2 KB (373 words) - 17:43, 2 October 2018
  • Publication:Onica15PTP
    |document=Document for Publication-Onica15PTP.pdf |title=Fault-Tolerant Precision Time Protocol for Smart Grids
    1 KB (188 words) - 08:09, 9 August 2015
  • Publication:Vavala15SRDS
    |document=Document for Publication-Vavala15SRDS.pdf
    1 KB (137 words) - 08:14, 9 August 2015
  • Publication:Medeiros2015tese
    |document=Document for Publication-Medeiros2015tese.pdf |title=Secure Monitoring for a Secure Smart Grid
    2 KB (334 words) - 16:33, 2 October 2018
  • Publication:Caldeira2015Extreme
    |document=Document for Publication-Caldeira2015Extreme.pdf |title=Methods and Tools for Assessment of Wireless Networks in Extreme Environments
    2 KB (296 words) - 07:50, 5 April 2017
  • Publication:Semedo2014LoadBalancingSDN
    |document=Document for Publication-Semedo2014LoadBalancingSDN.pdf ...pose a Multi-Algorithm Load Balancer (MALOB), a load balancing application for SDNs that has the capability to adapt to the different types of requests, s
    3 KB (433 words) - 17:46, 2 October 2018
  • Publication:Alaluna2015NetVirt
    |document=Document for Publication-Alaluna2015NetVirt.pdf
    2 KB (244 words) - 07:35, 5 June 2016
  • Publication:Cogo2016integration
    |document=Document for Publication-cogo2016integration.pdf
    1 KB (146 words) - 13:50, 26 January 2016
  • Publication:Mest FabioPereira Set17
    |document=Document for Publication-Mest FabioPereira Set17.pdf ...ch-based alternatives have been shown to achieve higher levels of accuracy for the same cost. Existing switches, however, lack the necessary
    3 KB (383 words) - 19:05, 24 February 2018
  • Publication:Cogo2016efficient
    |document=Document for Publication-Cogo2016efficient.pdf ...s efficiently may accelerate medical breakthroughs, but augments the risks for donors' privacy. The million-scale size and criticality of sets of genomes
    1 KB (166 words) - 22:18, 13 November 2016
  • Publication:CODASPY 2016
    |document=Document for Publication-CODASPY 2016.pdf
    1 KB (206 words) - 08:04, 5 June 2016
  • Publication:DSNa 2016
    |document=Document for Publication-DSNa 2016.pdf during software development, the tendency for source code to
    1 KB (202 words) - 08:03, 5 June 2016
  • Publication:DSNb 2016
    |document=Document for Publication-DSNb 2016.pdf |abstract=Code identity is a fundamental concept for authenticated
    1 KB (204 words) - 08:03, 5 June 2016
  • Publication:ISSTA 2016
    |document=Document for Publication-ISSTA 2016.pdf ...ortant mechanisms for programmers to deal with this problem as they search for vulnerabilities automatically in the application source code, allowing prog
    2 KB (224 words) - 22:15, 13 November 2016
  • Publication:ComputerNetworks 2016
    |document=Document for Publication-ComputerNetworks 2016.pdf ...for control traffic in wide-area IP networks. This is an important problem for cloud services and other geo-distributed information infrastructures that e
    1 KB (166 words) - 08:02, 5 June 2016
  • Publication:Garcia2016lazarus poster
    |document=Document for Publication-garcia2016lazarus poster.pdf |title=Towards an Execution Environment for Intrusion-Tolerant Systems
    457 B (56 words) - 22:19, 13 November 2016
  • Publication:Garcia2011dsn poster rejuvenations
    |document=Document for Publication-garcia2011dsn poster rejuvenations.pdf |title=Diverse OS Rejuvenation for Intrusion Tolerance
    1 KB (184 words) - 10:29, 6 June 2016
  • Publication:Inforum15-Ruben-poster
    |document=Document for Publication-inforum15-Ruben-poster.pdf
    1 KB (174 words) - 09:54, 7 June 2016
  • Publication:Sensors15-Gjesus
    |document=Document for Publication-sensors15-Gjesus.pdf ...ynamics, clusters of sensor nodes sharing data correlation can be defined, for priority sensor selection in a fusion algorithm. The strategy was validated
    1 KB (188 words) - 10:02, 7 June 2016
  • Publication:2016 Mantas ConsistentSDN NSDIposter
    |document=Document for Publication-2016 Mantas ConsistentSDN NSDIposter.pdf
    1 KB (153 words) - 22:20, 13 November 2016
  • Publication:2016 Ferrolho SecDepVNE NSDIposter
    |document=Document for Publication-2016 Ferrolho SecDepVNE NSDIposter.pdf
    1 KB (159 words) - 22:21, 13 November 2016
  • Publication:2016 Ramos PhotonsIPTV IFIPNet
    |document=Document for Publication-2016 Ramos PhotonsIPTV IFIPNet.pdf
    1 KB (170 words) - 10:25, 19 July 2016
  • Publication:Amado2018
    |document=Document for Publication-Amado2018.pdf
    2 KB (282 words) - 14:30, 20 February 2019
  • Publication:PhD Thesis IberiaMedeiros
    |document=Document for Publication-PhD Thesis IberiaMedeiros.pdf |title=Detection of Vulnerabilities and Automatic Protection for Web Applications
    3 KB (463 words) - 16:34, 2 October 2018
  • Publication:Msc Thesis FredericoBrito
    |document=Document for Publication-Msc Thesis FredericoBrito.pdf |title=Fast Reroute Usig Segment Routing for Smart Grids
    2 KB (352 words) - 21:43, 13 November 2016
  • Publication:Correia2016tesemsc
    |document=Document for Publication-correia2016tesemsc.pdf
    2 KB (257 words) - 15:45, 16 January 2017
  • Publication:Lima2015apt
    |document=Document for Publication-lima2015apt.pdf
    312 B (39 words) - 14:54, 28 December 2016
  • Publication:Botelho2016
    |document=Document for Publication-botelho2016.pdf |title=Design and Implementation of a Consistent Datastore for a Distributed SDN Control Plane
    2 KB (258 words) - 15:14, 5 January 2017
  • Publication:Lacoste2016
    |document=Document for Publication-lacoste2016.pdf ...roviders, with customized security requirements as well as self-management for reducing administration complexity. The article presents the Supercloud arc
    1 KB (194 words) - 15:21, 5 January 2017
  • Publication:Oliveira2016mwds
    |document=Document for Publication-Oliveira2016mwds.pdf ...ure Storage), that can be modelled as key-value stores (KVSs) and combined for providing secure and dependable multi-cloud storage services. In this paper
    1 KB (180 words) - 15:14, 16 January 2017
  • Publication:Alcantara2016msc
    |document=Document for Publication-Alcantara2016msc.pdf |title=Low-cost Cloud-based Disaster Recovery for Transactional Databases
    2 KB (353 words) - 15:44, 16 January 2017
  • Publication:2017 Costa
    |document=Document for Publication-2017 Costa.pdf |abstract=MapReduce is a framework for processing large data sets much used in the context of cloud computing. Map
    2 KB (250 words) - 13:57, 30 May 2017
  • Publication:Alaluna2017Sirius
    |document=Document for Publication-Alaluna2017Sirius.pdf ... logical centralization of control has given operators the necessary tools for virtualization of network resources, at the required scale. The effectivene
    2 KB (291 words) - 14:43, 23 March 2017
  • Publication:Nogueira17esmr
    |document=Document for Publication-Nogueira17esmr.pdf ...ine fault tolerant replicated state machines and making them more suitable for cloud systems.
    1 KB (178 words) - 15:41, 27 March 2017
  • Publication:JRosa-MSc-Thesis
    |document=Document for Publication-JRosa-MSc-Thesis.pdf ...ly the European Space Agency (ESA). AIR provides a partitioned environment for the development and execution of aerospace applications, based on the idea
    2 KB (292 words) - 16:21, 31 March 2017
  • Publication:JCraveiro-MSc-Thesis
    |document=Document for Publication-JCraveiro-MSc-Thesis.pdf ...me POS will not compromise the timeliness of critical real-time functions. For this purpose, Linux is used as a case study. An embedded variant of Linux i
    2 KB (336 words) - 16:19, 31 March 2017
  • Publication:RCPinto-MSc-Thesis
    |document=Document for Publication-RCPinto-MSc-Thesis.pdf |title=Mechanisms for Enhanced Dependability and Timeliness in CAN
    2 KB (299 words) - 08:04, 5 April 2017
  • Publication:EPascoal-MSc-Thesis
    |document=Document for Publication-EPascoal-MSc-Thesis.pdf |title=AMOBA - ARINC 653 Simulator for Modular Space Based Applications
    1 KB (194 words) - 08:51, 2 April 2017
  • Publication:JSousa-MSc-Thesis
    |document=Document for Publication-JSousa-MSc-Thesis.pdf |title=Memory Protection and Qualification of Real-Time Operating Systems for Space Applications
    3 KB (381 words) - 18:37, 31 March 2017
  • Publication:JAnjos-MSc-Thesis
    |document=Document for Publication-JAnjos-MSc-Thesis.pdf |title=JAVA Development Platform for Real-Time Applications in Multi-core Architectures
    2 KB (324 words) - 17:40, 31 March 2017
  • Publication:JRufino-2016-SIGBED
    |document=Document for Publication-JRufino-2016-SIGBED.pdf ...Real-Time Operating System) architecture defines a partitioned environment for the development and execution of aerospace applications, following the noti
    2 KB (217 words) - 18:22, 31 March 2017
  • Publication:JRufino-2016-OSPERT
    |document=Document for Publication-JRufino-2016-OSPERT.pdf ...Real-Time Operating System) architecture defines a partitioned environment for aerospace applications, following the notion of time and space partitioning
    2 KB (236 words) - 18:21, 31 March 2017
  • Publication:Gouveia-2016-CERTS
    |document=Document for Publication-Gouveia-2016-CERTS.pdf ...ations at risk and CPSs are no exception. Noteworthy recurring issues are, for example, Buffer Overflows (BOs). We intend to deal with some types of BOs,
    2 KB (233 words) - 17:33, 26 May 2017
  • Publication:Casimiro-2017-ADA-Europe
    |document=Document for Publication-Casimiro-2017-ADA-Europe.pdf ...another that behaves as predictably as needed, providing critical services for a safe and secure operation. In this paper we address the problem of verify
    2 KB (233 words) - 14:13, 15 June 2017
  • Publication:MCoutinho-MSc-Thesis
    |document=Document for Publication-MCoutinho-MSc-Thesis.pdf
    2 KB (293 words) - 19:01, 31 March 2017
  • Publication:Gouveia-2016-INForum-Poster
    |document=Document for Publication-Gouveia-2016-INForum-Poster.pdf
    1 KB (134 words) - 20:49, 26 July 2017
  • Publication:Cogo17sharing genomes
    |document=Document for Publication-Cogo17sharing genomes.pdf ... privacy-sensitivity level of each portion. This article is a call to arms for a collaborative work between geneticists and security experts to build more
    1 KB (211 words) - 14:09, 7 April 2017
  • Publication:Costa2017
    |document=Document for Publication-Costa2017.pdf ... for analyzing big data in cloud environments. This platform is often used for critical data processing, e.g., in the context of scientific or financial s
    1 KB (170 words) - 09:07, 22 June 2017
  • Publication:Alves:2017-CANFD-INForum
    |document=Document for Publication-Alves-2017-CANFD-INForum.pdf
    1 KB (166 words) - 11:20, 7 November 2017
  • Publication:VavalaSRDS2012
    |document=Document for Publication-VavalaSRDS2012.pdf
    1 KB (161 words) - 11:08, 5 September 2017
  • Publication:VavalaDSN2017
    |document=Document for Publication-VavalaDSN2017.pdf
    1 KB (199 words) - 11:12, 5 September 2017
  • Publication:VavalaDepend2010
    |document=Document for Publication-VavalaDepend2010.pdf alternative for critical applications.
    1 KB (186 words) - 11:16, 5 September 2017
  • Publication:VavalaIjais2011
    |document=Document for Publication-VavalaIjais2011.pdf ...our contribution turns out to be a viable and energy-efficient alternative for critical applications.
    1 KB (187 words) - 11:18, 5 September 2017
  • Publication:2017 FabioPereira
    |document=Document for Publication-2017 FabioPereira.pdf networks. By summarizing all traffic for specific statistics of
    2 KB (265 words) - 06:13, 6 November 2017
  • Publication:DSN 2017
    |document=Document for Publication-DSN 2017.pdf |title=Demonstrating a Tool for Injection Attack Prevention in MySQL
    1 KB (187 words) - 17:50, 9 September 2017
  • Publication:EDCC 2017
    |document=Document for Publication-EDCC 2017.pdf |title=On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study
    2 KB (224 words) - 18:01, 9 September 2017
  • Publication:Gouveia:MSc-Thesis-2017
    |document=Document for Publication-Gouveia-MSc-Thesis-2017.pdf ...s has resulted in a tendency to adopt Runtime Verification (RV) techniques for embedded systems, when their criticality dictates the need to guarantee cor
    3 KB (413 words) - 11:24, 7 November 2017
  • Publication:Alves:2017-CANFD-ESI-INForum17
    |document=Document for Publication-Alves-2017-CANFD-ESI-INForum17.pdf ...us, one fundamental question is whether or not the ESI flag will be useful for building highly reliable distributed real-time embedded systems based on th
    1 KB (206 words) - 11:21, 7 November 2017
  • Publication:Jesus2017survey
    |document=Document for Publication-Jesus2017survey.pdf |title=A Survey on Data Quality for Dependable Monitoring in Wireless Sensor Networks
    2 KB (235 words) - 16:31, 25 November 2017
  • Publication:2017 PCosta TesePhD
    |document=Document for Publication-2017 PCosta TesePhD.pdf |abstract=MapReduce is a simple and elegant programming model suitable for loosely
    3 KB (383 words) - 19:20, 24 February 2018
  • Publication:2018 dsn scada
    |document=Document for Publication-2018 dsn scada fix.pdf ...(SCADA) system enhanced with Byzantine fault-tolerant (BFT) techniques. We document the challenges of building such system from a "traditional" non-BFT solutio
    1 KB (179 words) - 13:52, 28 June 2018
  • Publication:Jaeger2018FailureModel
    |document=Document for Publication-Jaeger2018FailureModel.pdf |title=Generic Sensor Failure Modeling for Cooperative Systems
    1 KB (186 words) - 13:44, 26 March 2018
  • Publication:Rufino18A
    |document=Document for Publication-Rufino18A.pdf |title=Hardware Support for Non-intrusive Runtime Verification on Processor Technologies
    1,024 B (130 words) - 12:22, 1 May 2019
  • Publication:Rufino18C
    |document=Document for Publication-Rufino18C.pdf ...lexible monitoring capabilities allowing to analyze the system's execution for ensuring safety requirements. To this end, a general SoC architecture is de
    1 KB (168 words) - 12:37, 1 May 2019
  • Publication:Rufino18B
    |document=Document for Publication-Rufino18B.pdf ...653 in Space Real-Time Operating System) defines a partitioned environment for the development and execution of aerospace applications, preserving applica
    1 KB (134 words) - 12:19, 1 May 2019
  • Publication:Rufino18D
    |document=Document for Publication-Rufino18D.pdf ...liness, due to their inherent intrusiveness, which make them clearly unfit for critical systems.
    2 KB (218 words) - 12:24, 1 May 2019
  • Publication:Rufino18E
    |document=Document for Publication-Rufino18E.pdf ...edule is a symptom of an erroneous state that may result on a serious risk for the system integrity. Spreading the design task model, as a timing referenc
    1 KB (214 words) - 12:25, 1 May 2019
  • Publication:Alchieri2016reconf-smr
    |document=Document for Publication-alchieri2016reconf-smr.pdf
    1 KB (154 words) - 10:21, 8 June 2018
  • Publication:Sousa2017hlf-smart-short
    |document=Document for Publication-Sousa2017hlf-smart-short.pdf |title=A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform (short paper)
    737 B (91 words) - 10:36, 8 June 2018
  • Publication:Sousa2017hlf-smart-dsn18
    |document=Document for Publication-Sousa2017hlf-smart-dsn18.pdf |title=A Byzantine Fault-Tolerant Ordering Service for the Hyperledger Fabric Blockchain Platform
    1 KB (186 words) - 11:03, 8 June 2018
  • Publication:Soares2018
    |document=Document for Publication-Soares2018.pdf For these reasons the logical centralisation offered by Software-Defined Networ
    3 KB (444 words) - 09:49, 22 January 2019
  • Publication:Marques2018
    |document=Document for Publication-Marques2018.pdf |abstract=The Internet today is mainly used for distributing content, in a fundamental departure from its original goal of
    2 KB (238 words) - 15:04, 2 October 2018
  • Publication:Maia2018
    |document=Document for Publication-Maia2018.pdf ...itor and a routing and traffic engineering module. The first is a solution for monitoring with the goal to obtain a global view of the current state of th
    2 KB (384 words) - 16:27, 2 October 2018
  • Publication:BrunoVavalaTese
    |document=Document for Publication-BrunoVavalaTese.pdf ...ivers availability guarantees to clients, while passive replication allows for computationally efficient processing. Interestingly, all of our techniques
    3 KB (525 words) - 15:53, 2 October 2018
  • Publication:ManuelMendoncaTese
    |document=Document for Publication-ManuelMendoncaTese.pdf Our final contribution is a methodology and framework for the discovery of errors and vulnerabilities in Windows DD by resorting to t
    4 KB (622 words) - 15:55, 2 October 2018
  • Publication:I2MTC2018
    |document=Document for Publication-I2MTC2018.pdf ... the main challenges, suggesting alternatives and potential research lines for future works.
    1 KB (192 words) - 06:28, 9 October 2018
  • Publication:MaxCompNetworks19
    |document=Document for Publication-MaxCompNetworks19.pdf ...tor and only offer traditional networking services. As such, their support for critical applications that need to be deployed across multiple trust domain
    2 KB (278 words) - 14:04, 26 July 2019
  • Publication:Cogo19enabling
    |document=Document for Publication-Cogo19enabling.pdf ...genomes, (2) a similarity-based deduplication and delta-encoding algorithm for sequencing data, and (3) an auditability scheme to verify who has effective
    2 KB (259 words) - 14:30, 8 August 2019
  • Publication:Alves:18
    |document=Document for Publication-Alves-18.pdf |title=CAN FD: a communication network for future avionic systems
    403 B (53 words) - 16:53, 15 September 2019
  • Publication:Nascimento2019
    |document=Document for Publication-Nascimento2019.pdf ...solution may become a hard problem. In this paper we propose a methodology for addressing this optimization problem in an automated way. It considers vari
    2 KB (215 words) - 22:53, 25 November 2019
  • Publication:Nascimento2019MScThesis
    |document=Document for Publication-Nascimento2019MScThesis.pdf |title=Evaluation of WSN Technology for Dependable Monitoring in Water Environments
    2 KB (340 words) - 23:05, 25 November 2019
  • Publication:Casimiro2019SRDS-FA
    |document=Document for Publication-Casimiro2019SRDS-FA.pdf
    2 KB (243 words) - 13:50, 24 January 2020
  • Publication:Casimiro2019SAFECOMP-FA
    |document=Document for Publication-Casimiro2019SAFECOMP-FA.pdf ...MON – A dependable Monitoring Platform based on Wireless Sensor Networks for Water Environments
    2 KB (228 words) - 23:23, 25 November 2019
  • Publication:Sa2019BICT
    |document=Document for Publication-Sa2019BICT.pdf ...e noise as a useful information, instead of having it as a negative factor for the performance of the identification process.
    2 KB (299 words) - 22:52, 24 September 2021
  • Publication:Jesus2018Safecomp
    |document=Document for Publication-Jesus2018Safecomp.pdf ...n in environmental sensor networks do not portray the required sensitivity for the differentiation of these processes or they are unable to meet the time
    2 KB (235 words) - 23:52, 25 November 2019
  • Publication:Sa2020Sensors
    |document=Document for Publication-Sa2020Sensors.pdf
    2 KB (265 words) - 16:47, 24 September 2021
  • Publication:Viegas2020semisupervised
    |document=Document for Publication-Viegas2020semisupervised.pdf ... classifications over time. In this paper, we propose a new reliable model for semi-supervised intrusion detection that uses a verification technique to p
    1 KB (195 words) - 18:49, 28 February 2020
  • Publication:Viegas2020facing
    |document=Document for Publication-Viegas2020facing.pdf |title=Facing the Unknown: a Stream Learning Intrusion Detection System for Reliable Model Updates
    1 KB (172 words) - 18:55, 28 February 2020
  • Publication:Santos2020longlasting
    |document=Document for Publication-Santos2020longlasting.pdf ...posed of 10TB of data, show that the technique we propose remains reliable for ten months without model updates. Additionally, our proposal increases its
    1 KB (194 words) - 18:58, 28 February 2020
  • Publication:Abreu2020iamiot
    |document=Document for Publication-Abreu2020iamiot.pdf |title=Identity and Access Management for IoT in Smart Grid
    2 KB (209 words) - 19:02, 28 February 2020
  • Publication:Cogo2020GenoDedup
    |document=Document for Publication-Cogo2020GenoDedup.pdf |title=GenoDedup: Similarity-Based Deduplication and Delta-Encoding for Genome Sequencing Data
    2 KB (243 words) - 14:59, 22 September 2021
  • Publication:Berger21bftreads
    |document=Document for Publication-Berger21bftreads.pdf ... which a malicious leader blocks correct clients and present two solutions for patching the protocol, making read-only operations fast and correct. The tw
    2 KB (248 words) - 16:08, 29 September 2021

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)

Views
Personal tools
Toolbox
Navigators toolbox