Nodes in a mobile ad hoc network need to come up with counter measures against malicious activity. This is more true for the ad hoc environment where there is a total lack of centralized or third party authentication ...
详细信息
Nodes in a mobile ad hoc network need to come up with counter measures against malicious activity. This is more true for the ad hoc environment where there is a total lack of centralized or third party authentication and security architectures. This paper presents a game-theoretic method to analyze intrusion detection in mobile ad hoc networks. We use game theory to model the interactions between the nodes of an ad hoc network. We view the interactionbetween an attacker and an individual node as a two player noncooperative game, and construct models for such a game.
Software architectures must frequently evolve to cope with changing requirements, and this evolution often implies integrating new concerns. Unfortunately, existing architecture description languages provide little or...
详细信息
Software architectures must frequently evolve to cope with changing requirements, and this evolution often implies integrating new concerns. Unfortunately, existing architecture description languages provide little or no support for this kind of evolution. The software architect must modify the architecture manually, which risks introducing inconsistencies. In previous work, we have proposed the TranSATframework, which provides a pattern construct for describing new concerns and their integration into an existing architecture. As the interactionbetween the new concern and the existing architecture may be complex, it is essential that the framework ensure the coherence of the resulting architecture. In this paper, we introduce a language for specifying patterns and verifications that ensure that the concern represented by a pattern can be safely integrated into an existing architecture. The verifications comprise static verifications that check coherence properties before the architecture is modified and dynamic verifications that focus on the parts of the architecture that are affected by the pattern. As a result of these verifications, patterns can be provided as a commodity, such that a software architect can confidently apply a pattern obtained from a third-party developer
Cloud services such as IBM Cloud or Amazon Web Services are increasingly becoming the environments where applications are developed, tested, and deployed, data gets stored, and businesses are run. Many of the features...
Cloud services such as IBM Cloud or Amazon Web Services are increasingly becoming the environments where applications are developed, tested, and deployed, data gets stored, and businesses are run. Many of the features that define a cloud (e.g., resiliency, elasticity, consistency, security) are realized through runtime technologies. Clouds are polyglot environments, and therefore advances in cloud development are directly driven by innovation in runtime technologies. However, cloud environments pose unique and often conflicting demands on runtime systems that are generally less of a concern in isolated systems. Throughput performance (how many results can my application produce?), density (how many instances of my application can I create and run simultaneously in my provisioned environment?), startup performance (how quickly can I start a new instance of my application?), and language interoperability are all examples of important considerations that require innovative *** language runtimes are complex, dynamic systems that involve a myriad of components that must work cooperatively to achieve the functional and performance requirements of a given language. Typical core runtime technologies include dynamic just-in-time compilers for performance, garbage collection for heap management, platform abstraction for ease of portability to different hardware and operating system environments, test infrastructure for quality control, developer tooling for diagnosis and tuning of the various components, and interoperability between different language *** workloads are typically containerized and employ microservice and serverless architectures. Achieving peak performance in such environments requires careful tuning of the cloud services and applications in concert with the runtime *** goal of this workshop was to bring together research, industry, and developers from runtimes and cloud communities to share and discuss innovations, challenge
暂无评论