35,356 research outputs found
Verifying service continuity in a satellite reconfiguration procedure: application to a satellite
The paper discusses the use of the TURTLE UML profile to model and verify service continuity during dynamic reconfiguration of embedded software, and space-based telecommunication software in particular. TURTLE extends UML class diagrams with composition operators, and activity diagrams with temporal operators. Translating TURTLE to the formal description technique RT-LOTOS gives the profile a formal semantics and makes it possible to reuse verification techniques implemented by the RTL, the RT-LOTOS toolkit developed at LAAS-CNRS. The paper proposes a modeling and formal validation methodology based on TURTLE and RTL, and discusses its application to a payload software application in charge of an embedded packet switch. The paper demonstrates the benefits of using TURTLE to prove service continuity for dynamic reconfiguration of embedded software
A framework for proving the self-organization of dynamic systems
This paper aims at providing a rigorous definition of self- organization, one
of the most desired properties for dynamic systems (e.g., peer-to-peer systems,
sensor networks, cooperative robotics, or ad-hoc networks). We characterize
different classes of self-organization through liveness and safety properties
that both capture information re- garding the system entropy. We illustrate
these classes through study cases. The first ones are two representative P2P
overlays (CAN and Pas- try) and the others are specific implementations of
\Omega (the leader oracle) and one-shot query abstractions for dynamic
settings. Our study aims at understanding the limits and respective power of
existing self-organized protocols and lays the basis of designing robust
algorithm for dynamic systems
Architectures for smart end-user services in the power grid
Abstract-The increase of distributed renewable electricity generators, such as solar cells and wind turbines, requires a new energy management system. These distributed generators introduce bidirectional energy flows in the low-voltage power grid, requiring novel coordination mechanisms to balance local supply and demand. Closed solutions exist for energy management on the level of individual homes. However, no service architectures have been defined that allow the growing number of end-users to interact with the other power consumers and generators and to get involved in more rational energy consumption patterns using intuitive applications. We therefore present a common service architecture that allows houses with renewable energy generation and smart energy devices to plug into a distributed energy management system, integrated with the public power grid. Next to the technical details, we focus on the usability aspects of the end-user applications in order to contribute to high service adoption and optimal user involvement. The presented architecture facilitates end-users to reduce net energy consumption, enables power grid providers to better balance supply and demand, and allows new actors to join with new services. We present a novel simulator that allows to evaluate both the power grid and data communication aspects, and illustrate a 22% reduction of the peak load by deploying a central coordinator inside the home gateway of an end-user
Recommended from our members
Integrity protection for code-on-demand mobile agents in e-commerce
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection in mobile agent technology, still hinder the widespread use of software agents: from the agent’s perspective, mobile agent integrity should be protected against attacks from malicious hosts and other agents. In this paper, we present Code-on-Demand(CoD) mobile agents and a corresponding agent integrity protection scheme. Compared to the traditional assumption that mobile agents consist of invariant code parts, we propose the use of dynamically upgradeable agent code, in which new agent function modules can be added and redundant ones can be deleted at runtime. This approach will reduce the weight of agent programs, equip mobile agents with more flexibility, enhance code privacy and help the recoverability of agents after attack. In order to meet the security challenges for agent integrity protection, we propose agent code change authorization protocols and a double integrity verification scheme. Finally, we discuss the Java implementation of CoD mobile agents and integrity protection
Simulation of Energy Consumption in Multi Cluster Wireless Sensor Networks
Energy conserving protocols in wireless sensor networks (WSNs), such as S-MAC, introduce multi-cluster network. The border nodes in multi cluster WSNs have more active time than the other nodes in the network; hence have more energy depletion rate. Since battery replacement in most networks is considered difficult, one or more nodes running out of energy prematurely will affect the network connectivity and decrease the overall network performance severely. This paper aims to (1) analyze the energy consumption in a multi-cluster sensor network and compare it to the single cluster scenario (2) investigate the merging time in a single cluster network. The result shows that, in average the energy needed to deliver a packet in the multi cluster networks is about 150% more than the energy needed in the single cluster networks. Moreover, the merging time in the single cluster network using schedule offset as the merging criteria in average is slightly smaller than one in the network using schedule ID as the merging criteria
- …