The provision of services such as credit card facilities using Intelligent Networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not...
详细信息
The provision of services such as credit card facilities using Intelligent Networks (IN) depends upon the ability to process real-time data. If their data is deliberately delayed during transit, these services may not be able to function accurately. This paper examines INs and highlights their vulnerability to network delay attacks. In particular, the nature of rear-time communications and the main approach that has been developed to determine whether received data is being sent in real-time or not is discussed. The deficiencies in this approach in terms of its ability to counteract the different forms of a network delay attack are highlighted and an alternative method which addresses these drawbacks is presented. Finally, the results achieved following the implementation and subsequent testing of the alternative approach are discussed. (C) 1997 Elsevier science B.V.
Type-safe high-level languages such as Java have not yet found their way into the domain of deeply embedded systems, even though numerous attempts have been made to make these languages cost attractive. One major chal...
详细信息
In this paper we present a prototype of the RTSC - the Real-Time System Compiler. The RTSC is a compiler-based tool that leverages the migration from event-triggered to time-triggered real-time systems. For this purpo...
详细信息
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management system...
详细信息
Security management is one of the key functional areas in open systems network management. Two key aspects of security management are managing user security services and providing security to network management systems. These are examined in tum to give the reader an overview of the state-of-the-art in security management. The ISO OSI Reference Model is used as a basis to present the security threats, security services and mechanisms which have to be managed. Telecommunications management networks are used as an example of management applications which both provide management and require the provision of security and security management services. The OSI approach to network management is examined in detail. This is followed by a survey of the categories of OSI security management activities, and a discussion of the security management needs of various common security services. The need for security for network management systems is examined.
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special at...
详细信息
Several international standards for asynchronous data compression are available today. In 1993 the International Telecommunication Union (ITU) started to research possible ways to compress synchronous data. Special attention was given to compatibility with previous asynchronous standards, namely V.42bis. In September 1993 a proposal for modification of the V.42bis standard to make ii applicable to synchronous data was published. In this paper a prototype of a synchronous data link layer protocol based on the ITU proposals is described. The protocol chosen is HDLC based. The V.42bis compression standard is adapted to serve the needs of a synchronous protocol. A functional model is designed followed by a performance analysis of the protocol. The analysis shows a decrease of the compression ratio due to the adaption of the compression algorithm. (C) 1997 Elsevier science B.V.
Software development in the domain of embedded and deeply embedded systems is dominated by cost pressure and extremely limited hardware resources. As a result, modern concepts for separation of concerns and software r...
详细信息
作者:
Honig, Timo
Department of Computer Science Distributed Systems and Operating Systems Martensstr. 1 ErlangenD-91058 Germany
From an ecological and economic perspective, saving energy is an important factor for the design of today's computing systems. However, building energy-efficient systems is a challenging task for system designers....
详细信息
ISBN:
(纸本)9783885796404
From an ecological and economic perspective, saving energy is an important factor for the design of today's computing systems. However, building energy-efficient systems is a challenging task for system designers. It requires exact knowledge about the system's components (i.e., software and hardware components) and it is not immediately obvious how the energy demand of a system can be improved. This paper presents energy-aware programming techniques that help developers at optimizing the energy demand of software. Such techniques address sensibility aspects (i.e., energy awareness) and provide optimization suggestions to developers. The paper further discusses responsibility aspects that emerge from the advent of energy-aware programming techniques.
This paper presents an approach to the specification of external interfaces of an electronic broker used in the Architecture for Electronic Brokerage systems (AEBS). The external interface specified by the AEBS archit...
详细信息
Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubi...
详细信息
The objective of the 13th edition of Ph Doctoral Students in Object-Oriented systems workshop (PHDOOS) was to offer an opportunity for PhD students to meet and share their research experiences, and to discover commona...
详细信息
暂无评论