Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV047692600
    Format: 1 online resource (158 pages)
    ISBN: 9783030308568
    Series Statement: Lecture Notes in Computer Science Ser. v.11732
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Organization -- Contents -- Keynote Paper -- Ethics and Privacy in Autonomous Systems: A Software Exoskeleton to Empower the User -- 1 The Digital Society -- 2 The Exosoul Vision and Challenges -- 3 The EXOSOUL Methodology -- 4 Conclusions -- References -- Invited Paper -- A Distilled Characterization of Resilience and Its Embraced Properties Based on State-Spaces -- 1 Introduction -- 2 A Conceptual Framework for Characterizing Resilience in ICT Systems -- 2.1 Basic Terms and Concepts -- 2.2 A Dynamic Characterization of Resilience -- 2.3 Basic Properties of Change that Affect the System Resilience -- 3 Design Strategies and Metrics for Resilience in ICT Systems -- 3.1 Resilience Strategies -- 3.2 Resilience Metrics -- 4 Discussion and Future Works -- References -- Resilience Engineering in Complex and Critical Applications -- Modelling Autonomous Resilient Multi-robotic Systems -- 1 Introduction -- 2 Modelling and Refinement in Event-B -- 3 Autonomous Behaviour of a Resilient Multi-robotic System -- 3.1 Resilience-Explicit Modelling of Multi-agent Interactions -- 4 Modelling of a Resilient Swarm of Drones -- 4.1 Case Study Description -- 4.2 Event-B Development of a Swarm of Drones -- 5 Conclusions and Related Work -- References -- Reactive Middleware for Effective Requirement Change Management of Cloud-Based Global Software Development -- 1 Introduction -- 2 Related Work -- 3 Reactive Middleware -- 3.1 Publish/Subscribe System -- 3.2 Artefacts Monitoring/Interpretation System -- 3.3 Management Guidelines for System Engineering -- 4 Reactive Middleware Evaluation -- 4.1 Analysis of Expert Review -- 4.2 Airlock Control System Case Study -- 5 Threats to Validity -- 5.1 Ensuring Traceability -- 5.2 Constitution of the Expert Panel -- 6 Conclusion -- References -- Fault-Tolerant IoT -- 1 Introduction -- 2 Research Method , 2.1 Search Strategy -- 2.2 Selection Strategy -- 3 Background on IoT Architectures -- 4 Fault-Tolerant IoT Architectural Patterns and Styles (RQ1) -- 5 Fault-Tolerance Techniques for Resilient IoT (RQ2) -- 5.1 Replication -- 5.2 Network Control -- 5.3 Distributed Recovery Block -- 5.4 Time Redundancy -- 6 Quality of IoT Service Associated with Fault-Tolerance (RQ3) -- 7 Horizontal Analysis -- 7.1 FT Techniques vs Architectural Patterns -- 7.2 FT Techniques vs Quality Attributes -- 8 Challenges and Emerging Trends (RQ4) -- 8.1 Publication Year -- 8.2 Publication Type -- 8.3 Publication Venues -- 8.4 Emerging Trends in Resilience for FT-IoT -- 9 Threats to Validity -- 10 Conclusion -- References -- JARVIS, A Hardware/Software Framework for Resilient Industry 4.0 Systems -- 1 Introduction -- 2 System Requirements Specification -- 3 System/Subsystem Design Description -- 4 Digital Twins as Knowledge Base -- 4.1 EIS Subsystem -- 4.2 DAS Subsystem -- 5 Conclusions and Future Works -- References -- Testing and Validation Methods -- Toward Testing Self-organizations in Multi-Embedded-Agent Systems -- 1 Introduction -- 2 Review of Testing Methods for Self-organizations -- 2.1 Formal Methods -- 2.2 Run-Time Validation Methods -- 3 Testing Multi Wireless Agent Communication -- 3.1 Definitions -- 3.2 Approach Validation -- 4 Conclusion and Future Work -- References -- Towards Integrated Correctness Analysis and Performance Evaluation of Software Systems (Doctoral Forum Paper) -- 1 Introduction -- 2 Objectives and Proposed Solution -- 3 Preliminary Work -- 4 Related Work -- 5 Conclusion -- References -- Security, Trust and Privacy Management -- An Energy Aware Approach to Trust Management Systems for Embedded Multi-Agent Systems -- 1 Introduction -- 2 Trust Management Systems for Embedded Multi-Agent Systems -- 2.1 Security and Trust -- 2.2 Information Sources , 2.3 Models -- 2.4 Vulnerability -- 2.5 Constraints -- 2.6 Trust in Embedded and Distributed Pervasive Systems -- 3 A Multi-Armed Bandit Learning Based Approach -- 3.1 Budgeted Multi-Armed Bandit -- 3.2 Taking into Account TMS Energy Consumption in MAB -- 3.3 Case Study -- 3.4 Results -- 4 Conclusion and Future Work -- References -- Addressing Security Properties in Systems of Systems: Challenges and Ideas -- Abstract -- 1 Introduction -- 2 Security Issues in Systems of Systems -- 2.1 Directed SoS -- 2.2 Collaborative SoS -- 2.3 Acknowledged SoS -- 2.4 Virtual SoS -- 3 Addressing Security -- 3.1 Modeling Security of System of Systems -- 3.2 Testing the Security of System of Systems -- 4 Conclusions -- Acknowledgments -- References -- On the Use of Quality Models to Characterize Trustworthiness Properties -- 1 Introduction -- 2 Background and Quality Model Concepts -- 2.1 Data Anonymization and PRIVAaaS Framework -- 2.2 The LSP Scoring Technique and Quality Model -- 3 Privacy Quality Model: Anonymization and Linkage Attacks -- 4 Lessons Learned and Conclusions -- References -- Author Index
    Additional Edition: Erscheint auch als Druck-Ausgabe Calinescu, Radu Software Engineering for Resilient Systems Cham : Springer International Publishing AG,c2019 ISBN 9783030308551
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Fehlertoleranz ; Zuverlässigkeit ; Software Engineering ; Formale Methode ; Verifikation ; Sicherheitskritisches System ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages