10,836 research outputs found
Automated Synthesis of SEU Tolerant Architectures from OO Descriptions
SEU faults are a well-known problem in aerospace environment but recently their relevance grew up also at ground level in commodity applications coupled, in this frame, with strong economic constraints in terms of costs reduction. On the other hand, latest hardware description languages and synthesis tools allow reducing the boundary between software and hardware domains making the high-level descriptions of hardware components very similar to software programs. Moving from these considerations, the present paper analyses the possibility of reusing Software Implemented Hardware Fault Tolerance (SIHFT) techniques, typically exploited in micro-processor based systems, to design SEU tolerant architectures. The main characteristics of SIHFT techniques have been examined as well as how they have to be modified to be compatible with the synthesis flow. A complete environment is provided to automate the design instrumentation using the proposed techniques, and to perform fault injection experiments both at behavioural and gate level. Preliminary results presented in this paper show the effectiveness of the approach in terms of reliability improvement and reduced design effort
A new security architecture for SIP based P2P computer networks
Many applications are transferred from C/S (Client/Server) mode to P2P (Peer-to-Peer) mode such as VoIP (Voice over IP). This paper presents a new security architecture, i.e. a trustworthy authentication algorithm of peers, for Session Initialize Protocol (SIP) based P2P computer networks. A mechanism for node authentication using a cryptographic primitive called one-way accumulator is proposed to secure the P2P SIP computer networks. It leverages the distributed nature of P2P to allow for distributed resource discovery and rendezvous in a SIP network, thus eliminating (or at least reducing) the need for centralized servers. The distributed node authentication algorithm is established for the P2P SIP computer networks. The corresponding protocol has been implemented in our P2P SIP experiment platform successfully. The performance study has verified the proposed distributed node authentication algorithm for SIP based P2P computer networks
An Introduction to Software Engineering and Fault Tolerance
This book consists of the chapters describing novel approaches to integrating
fault tolerance into software development process. They cover a wide range of
topics focusing on fault tolerance during the different phases of the software
development, software engineering techniques for verification and validation of
fault tolerance means, and languages for supporting fault tolerance
specification and implementation. Accordingly, the book is structured into the
following three parts: Part A: Fault tolerance engineering: from requirements
to code; Part B: Verification and validation of fault tolerant systems; Part C:
Languages and Tools for engineering fault tolerant systems
Workshops on Extreme Scale Design Automation (ESDA) Challenges and Opportunities for 2025 and Beyond
Integrated circuits and electronic systems, as well as design technologies,
are evolving at a great rate -- both quantitatively and qualitatively. Major
developments include new interconnects and switching devices with atomic-scale
uncertainty, the depth and scale of on-chip integration, electronic
system-level integration, the increasing significance of software, as well as
more effective means of design entry, compilation, algorithmic optimization,
numerical simulation, pre- and post-silicon design validation, and chip test.
Application targets and key markets are also shifting substantially from
desktop CPUs to mobile platforms to an Internet-of-Things infrastructure. In
light of these changes in electronic design contexts and given EDA's
significant dependence on such context, the EDA community must adapt to these
changes and focus on the opportunities for research and commercial success. The
CCC workshop series on Extreme-Scale Design Automation, organized with the
support of ACM SIGDA, studied challenges faced by the EDA community as well as
new and exciting opportunities currently available. This document represents a
summary of the findings from these meetings.Comment: A Computing Community Consortium (CCC) workshop report, 32 page
What's (Not) Validating Network Paths: A Survey
Validating network paths taken by packets is critical for a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along
endhost-specified paths and verify whether packets have taken those paths.
However, neither enforcement nor verification is supported by the current
Internet. Due likely to a long-standing confusion between routing and
forwarding, only limited solutions for path validation exist in the literature.
This survey article aims to reinvigorate research in to the significant and
essential topic of path validation. It crystallizes not only how path
validation works but also where seemingly qualified solutions fall short. The
analyses explore future research directions in path validation toward improving
security, privacy, and efficiency.Comment: 30 pages with 5 figures, submitted to ACM Computing Survey
The F-18 systems research aircraft facility
To help ensure that new aerospace initiatives rapidly transition to competitive U.S. technologies, NASA Dryden Flight Research Facility has dedicated a systems research aircraft facility. The primary goal is to accelerate the transition of new aerospace technologies to commercial, military, and space vehicles. Key technologies include more-electric aircraft concepts, fly-by-light systems, flush airdata systems, and advanced computer architectures. Future aircraft that will benefit are the high-speed civil transport and the National AeroSpace Plane. This paper describes the systems research aircraft flight research vehicle and outlines near-term programs
Fog Robotics for Efficient, Fluent and Robust Human-Robot Interaction
Active communication between robots and humans is essential for effective
human-robot interaction. To accomplish this objective, Cloud Robotics (CR) was
introduced to make robots enhance their capabilities. It enables robots to
perform extensive computations in the cloud by sharing their outcomes. Outcomes
include maps, images, processing power, data, activities, and other robot
resources. But due to the colossal growth of data and traffic, CR suffers from
serious latency issues. Therefore, it is unlikely to scale a large number of
robots particularly in human-robot interaction scenarios, where responsiveness
is paramount. Furthermore, other issues related to security such as privacy
breaches and ransomware attacks can increase. To address these problems, in
this paper, we have envisioned the next generation of social robotic
architectures based on Fog Robotics (FR) that inherits the strengths of Fog
Computing to augment the future social robotic systems. These new architectures
can escalate the dexterity of robots by shoving the data closer to the robot.
Additionally, they can ensure that human-robot interaction is more responsive
by resolving the problems of CR. Moreover, experimental results are further
discussed by considering a scenario of FR and latency as a primary factor
comparing to CR models.Comment: 17th IEEE International Symposium on Network Computing and
Applications (NCA 2018), Cambridge, US
Automated Evaluation of Semantic Segmentation Robustness for Autonomous Driving
One of the fundamental challenges in the design of perception systems for
autonomous vehicles is validating the performance of each algorithm under a
comprehensive variety of operating conditions. In the case of vision-based
semantic segmentation, there are known issues when encountering new scenarios
that are sufficiently different to the training data. In addition, even small
variations in environmental conditions such as illumination and precipitation
can affect the classification performance of the segmentation model. Given the
reliance on visual information, these effects often translate into poor
semantic pixel classification which can potentially lead to catastrophic
consequences when driving autonomously. This paper presents a novel method for
analysing the robustness of semantic segmentation models and provides a number
of metrics to evaluate the classification performance over a variety of
environmental conditions. The process incorporates an additional sensor (lidar)
to automate the process, eliminating the need for labour-intensive hand
labelling of validation data. The system integrity can be monitored as the
performance of the vision sensors are validated against a different sensor
modality. This is necessary for detecting failures that are inherent to vision
technology. Experimental results are presented based on multiple datasets
collected at different times of the year with different environmental
conditions. These results show that the semantic segmentation performance
varies depending on the weather, camera parameters, existence of shadows, etc..
The results also demonstrate how the metrics can be used to compare and
validate the performance after making improvements to a model, and compare the
performance of different networks
Development and Validation of Functional Model of a Cruise Control System
Modern automobiles can be considered as a collection of many subsystems
working with each other to realize safe transportation of the occupants.
Innovative technologies that make transportation easier are increasingly
incorporated into the automobile in the form of functionalities. These new
functionalities in turn increase the complexity of the system framework present
and traceability is lost or becomes very tricky in the process. This hugely
impacts the development phase of an automobile, in which, the safety and
reliability of the automobile design should be ensured. Hence, there is a need
to ensure operational safety of the vehicles while adding new functionalities
to the vehicle. To address this issue, functional models of such systems are
created and analysed. The main purpose of developing a functional model is to
improve the traceability and reusability of a system which reduces development
time and cost. Operational safety of the system is ensured by analysing the
system with respect to random and systematic failures and including safety
mechanism to prevent such failures. This paper discusses the development and
validation of a functional model of a conventional cruise control system in a
passenger vehicle based on the ISO 26262 Road Vehicles - Functional Safety
standard. A methodology for creating functional architectures and an
architecture of a cruise control system developed using the methodology are
presented.Comment: In Proceedings FESCA 2016, arXiv:1603.0837
A System's Perspective Towards an Architecture Framework for Safe Automated Vehicles
With an increasing degree of automation, automated vehicle systems become
more complex in terms of functional components as well as interconnected
hardware and software components. Thus, holistic systems engineering becomes a
severe challenge. Emergent properties like system safety are not solely
arguable in singular viewpoints such as structural representations of software
or electrical wiring (e.g. fault tolerant). This states the need to get several
viewpoints on a system and describe correspondences between these views in
order to enable traceability of emergent system properties. Today, the most
abstract view found in architecture frameworks is a logical description of
system functions which structures the system in terms of information flow and
functional components. In this article we extend established system viewpoints
towards a capability-based assessment of an automated vehicle and conduct an
exemplary safety analysis to derive behavioral safety requirements. These
requirements can afterwards be attributed to different viewpoints in an
architecture frameworks and thus be integrated into a development process for
automated vehicles.Comment: 8 pages, 6 figures. Submitted to the 2018 IEEE ITS
- …