1,284,828 research outputs found

    ARIES WP3 – Needs and Requirements Analyses

    Get PDF
    Information and communication technologies have increasingly influenced and changed our daily life. They allow global connectivity and easy access to distributed applications and digital services over the Internet. This report analysis security requirements on trust establishment and trust evaluation based on two different use case scenarios: "Trusted Communication using COTS" and "Trust Establishment for Cross-organizational Crises Management". A systematic needs analysis is performed on both scenarios which haver resulted in a large and well documented set of requirements. This is the first step in a large effort to define a security architecture for the two use case scenarios.

    The STRESS Method for Boundary-point Performance Analysis of End-to-end Multicast Timer-Suppression Mechanisms

    Full text link
    Evaluation of Internet protocols usually uses random scenarios or scenarios based on designers' intuition. Such approach may be useful for average-case analysis but does not cover boundary-point (worst or best-case) scenarios. To synthesize boundary-point scenarios a more systematic approach is needed.In this paper, we present a method for automatic synthesis of worst and best case scenarios for protocol boundary-point evaluation. Our method uses a fault-oriented test generation (FOTG) algorithm for searching the protocol and system state space to synthesize these scenarios. The algorithm is based on a global finite state machine (FSM) model. We extend the algorithm with timing semantics to handle end-to-end delays and address performance criteria. We introduce the notion of a virtual LAN to represent delays of the underlying multicast distribution tree. The algorithms used in our method utilize implicit backward search using branch and bound techniques and start from given target events. This aims to reduce the search complexity drastically. As a case study, we use our method to evaluate variants of the timer suppression mechanism, used in various multicast protocols, with respect to two performance criteria: overhead of response messages and response time. Simulation results for reliable multicast protocols show that our method provides a scalable way for synthesizing worst-case scenarios automatically. Results obtained using stress scenarios differ dramatically from those obtained through average-case analyses. We hope for our method to serve as a model for applying systematic scenario generation to other multicast protocols.Comment: 24 pages, 10 figures, IEEE/ACM Transactions on Networking (ToN) [To appear

    Toward Contention Analysis for Parallel Executing Real-Time Tasks

    Get PDF
    In measurement-based probabilistic timing analysis, the execution conditions imposed to tasks as measurement scenarios, have a strong impact to the worst-case execution time estimates. The scenarios and their effects on the task execution behavior have to be deeply investigated. The aim has to be to identify and to guarantee the scenarios that lead to the maximum measurements, i.e. the worst-case scenarios, and use them to assure the worst-case execution time estimates. We propose a contention analysis in order to identify the worst contentions that a task can suffer from concurrent executions. The work focuses on the interferences on shared resources (cache memories and memory buses) from parallel executions in multi-core real-time systems. Our approach consists of searching for possible task contenders for parallel executions, modeling their contentiousness, and classifying the measurement scenarios accordingly. We identify the most contentious ones and their worst-case effects on task execution times. The measurement-based probabilistic timing analysis is then used to verify the analysis proposed, qualify the scenarios with contentiousness, and compare them. A parallel execution simulator for multi-core real-time system is developed and used for validating our framework. The framework applies heuristics and assumptions that simplify the system behavior. It represents a first step for developing a complete approach which would be able to guarantee the worst-case behavior

    Representing older people: towards meaningful images of the user in design scenarios

    Get PDF
    Designing for older people requires the consideration of a range of difficult and sometimes highly personal design problems. Issues such as fear, loneliness, dependency, and physical decline may be difficult to observe or discuss in interviews. Pastiche scenarios and pastiche personae are techniques that employ characters to create a space for the discussion of new technological developments and as a means to explore user experience. This paper argues that the use of such characters can help to overcome restrictive notions of older people by disrupting designers' prior assumptions. In this paper, we reflect on our experiences using pastiche techniques in two separate technology design projects that sought to address the needs of older people. In the first case pastiche scenarios were developed by the designers of the system and used as discussion documents with users. In the second case, pastiche personae were used by groups of users themselves to generate scenarios which were scribed for later use by the design team. We explore how the use of fictional characters and settings can generate new ideas and undermine rhetorical devices within scenarios that attempt to fit characters to the technology, rather than vice versa. To assist in future development of pastiche techniques in designing for older people, we provide an array of fictional older characters drawn from literary and popular culture.</p

    Use-case scenarios for an anti-Cryptosporidium therapeutic.

    Get PDF
    Cryptosporidium is a widely distributed enteric parasite that has an increasingly appreciated pathogenic role, particularly in pediatric diarrhea. While cryptosporidiosis has likely affected humanity for millennia, its recent "emergence" is largely the result of discoveries made through major epidemiologic studies in the past decade. There is no vaccine, and the only approved medicine, nitazoxanide, has been shown to have efficacy limitations in several patient groups known to be at elevated risk of disease. In order to help frontline health workers, policymakers, and other stakeholders translate our current understanding of cryptosporidiosis into actionable guidance to address the disease, we sought to assess salient issues relating to clinical management of cryptosporidiosis drawing from a review of the literature and our own field-based practice. This exercise is meant to help inform health system strategies for improving access to current treatments, to highlight recent achievements and outstanding knowledge and clinical practice gaps, and to help guide research activities for new anti-Cryptosporidium therapies

    Guidance on the use of data to support judgements on ‘Outcomes for learners’ in learning and skills inspections

    Get PDF
    This guidance covers: principles of outcomes for learners data and information inspectors use currently providers’ own analysis of performance information use of national averages when measuring performance progress learners make compared to their starting points other types of provision in learning and skills how inspectors will use common data sets – from September 2012 appendix – case study scenarios. - Age group: 14

    Campus Bridging Use Case Quality Attribute Scenarios

    Get PDF
    This document is both a user-­facing document (publicly accessible) and an internal working document intended to define quality attributes associated with user needs and use cases that fall under the general umbrella of Campus Bridging within the overall activities of XSEDE.XSEDE is supported by National Science Foundation Grant 1053575 (XSEDE: eXtreme Science and Engineering Discovery Environment)
    corecore