This paper describes a research project that uses embedded systems design principles to construct and simulate an Engine Control Unit (ECU) for a hybrid car. The ECU is designed to select a fuel type based on the st...
详细信息
This paper describes a research project that uses embedded systems design principles to construct and simulate an Engine Control Unit (ECU) for a hybrid car. The ECU is designed to select a fuel type based on the stress level of the simulated engine. The primary goal of the project was to use a robotics kit, connected to sensors, to simulate a hybrid car under certain stress conditions such as hill climbing or full throttle. The project uses the LEGO~ Mindstorms~ NXT robotics kit combined with a Java-based firmware, a pressure sensor to simulate a gas pedal, and a tilt sensor to determine when the car is traveling uphill or downhill. The objective was to develop, through simulation, a framework for adjusting the ratios/proportions of fuel types and mixture under the stress conditions. The expected result was to establish a basis for determining the ideal/optimal fuel-mix-stress ratios on the hybrid car's performance. Using the NXT robotics kit abstracted the low level details of the embedded system design, which allowed a focus on the high level design details of the research. Also, using the NXJ Java-based firmware allowed the incorporation of object oriented design principles into the project. The paper outlines the evolution and the compromises made in the choice of hardware and software components, and describes the computations and methodologies used in the project.
Pervasive computing technologies can benefit the injured, disabled or elderly people in their daily lives, and smart wheelchair has been a representative of this kind of technologies. However, most existing smart whee...
详细信息
Passive RFID tags have limited rewritable memory for data storage and limited computation power, which pose difficulties to implement security protection on RFID tags. It has been shown that strong security and privac...
详细信息
Smart mobile devices such as smartphones and tablets have become an integral part of our society. However, it also becomes a prime target for attackers with malicious intents. There have been a number of efforts on de...
详细信息
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio...
详细信息
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic ga...
详细信息
ISBN:
(纸本)9781467328920
A prerequisite to implementing virtualization-aware security solutions is to solve the "semantic gap" problem. Current approaches require a deep knowledge of the kernel data to manually solve the semantic gap. However, kernel data is very complex; an Operating System (OS) kernel contains thousands of data structures that have direct and indirect (pointer) relations between each other with no explicit integrity constraints. This complexity makes it impractical to use manual methods. In this paper, we present a new solution to systematically and efficiently solve the semantic gap for any OS, without any prior knowledge of the OS. We present: (i) KDD, a tool that systematically builds a precise kernel data definition for any C-based OS such as Windows and Linux. KDD generates this definition by performing points-to analysis on the kernel's source code to disambiguate the pointer relations. (ii) SVA, a security appliance that solves the semantic gap based on the generated definition, to systematically and externally map the virtual machines' physical memory and extract the runtime dynamic objects. We have implemented prototypes for KDD and SVA, and have performed different experiments to prove their effectiveness.
Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenanc...
详细信息
ISBN:
(纸本)9781467328920
Multi-tenancy helps service providers to save costs, improve resource utilization, and reduce service customization and maintenance time by sharing of resources and services. On the other hand, supporting multi-tenancy adds more complexity to the shared application's required capabilities. Security is a key requirement that must be addressed when engineering new SaaS applications or when re-engineering existing applications to support multi-tenancy. Traditional security (re)engineering approaches do not fit with the multi-tenancy application model where tenants and their security requirements emerge after the system was first developed. Enabling, runtime, adaptable and tenant-oriented application security customization on single service instance is a key challenging security goal in multi-tenant application engineering. In this paper we introduce TOSSMA, a Tenant-Oriented SaaS Security Management Architecture. TOSSMA allows service providers to enable their tenants in defining, customizing and enforcing their security requirements without having to go back to application developers for maintenance or security customizations. TOSSMA supports security management for both new and existing systems. Service providers are not required to write security integration code to use a specific security platform or mechanism. In this paper, we describe details of our approach and architecture, our prototype implementation of TOSSMA, give a usage example of securing a multi-tenant SaaS, and discuss our evaluation experiments of TOSSMA.
The automation of test case generation process can reduce the testing cost. However, the existing models being used by the test case generation techniques are largely manual built by domain expert from system requirem...
详细信息
The automation of test case generation process can reduce the testing cost. However, the existing models being used by the test case generation techniques are largely manual built by domain expert from system requirements. Thus there is a large gap to bridge between high-level requirements and concrete test cases in order to automate the test generation process. Since textual use cases are easy to describe and understand, they are often used to describe system requirement and are believed to be a good basis for system testing. In this paper, we propose a new approach for automating the generation of system test cases from textual use cases. We build Activity Tables from textual use cases, then construct an Extended Finite State Machine(EFSM) from Activity Tables, finally generate test cases from EFSM. Our objective is to cover the system in terms of statement coverage with those generated tests. A Market Information System(MIS) is employed to demonstrate our approach.
The increasing interest in the Internet of Things (IoT) has brought lots of opportunities and challenges to researchers. Cyber-space and physical world are more and more amalgamated by smart devices with networking ca...
详细信息
Proportional share scheduling algorithms have been widely studied as means of guaranteeing the QoS of applications. These algorithms allocate CPU resources to tasks based on their weight, but most are designed to beha...
详细信息
ISBN:
(纸本)9781450314923
Proportional share scheduling algorithms have been widely studied as means of guaranteeing the QoS of applications. These algorithms allocate CPU resources to tasks based on their weight, but most are designed to behave differently under variations in overall weight distribution and number of tasks. In this paper, we classify proportional share scheduling algorithms according to these differences in behavior and analyze the levels of QoS they achieve. Our analysis shows that variations in weight distribution and number of tasks have a significant impact on QoS. Based on this analysis, we further explain which algorithms are best suited to various environments. Copyright 2012 ACM.
暂无评论