The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
A blockchain is a public ledger for recording transactions, maintained by many nodes without central authority through a distributed cryptographic protocol. All nodes validate the information to be appended to the blockchain, and a consensus protocol ensures that the nodes agree on a unique order in which entries are appended. Consensus protocols for tolerating Byzantine faults have received renewed...
In this talk, I'll argue that we need to change our way of thinking drastically and Europe needs to catch up urgently those in the world who have already started to do their homework outside Europe in order to preserve employment and the standard of living in Europe. We have already missed the absolute leadership in the nano-electronics world. It is in the hands of US and Far East owned/based companies...
Achieving dependable software is a challenging problem, especially for industries beyond traditional safety-critical domains, such as telecommunications, consumer electronics, manufacturing, etc., where the cost of software failures is still quite high. Several factors contribute to exacerbate this problem: these industries are abruptly converting into software-driven ones; they must face time-to-market...
Data storage and processing is at the center of every human activity and business. Among all types of data being stored and processed, there is added value in personally identifiable data. Not only it has direct value for building contact networks but also allows fine grained profiling. Profiling and extensive service usage metric collections allow unprecedented knowledge about what people want, buy,...
This extended abstract discusses the application of ICT and data-management for dependability of electricity distribution grids. Focus of the contribution are the opportunities and barriers for small and medium-sized Distribution System Operators serving up to few hundred thousand customers.
Simulation-based fault injection (SBFI) is an indispensable technique for the early verification and dependability assessment of target circuits along the semi-custom design flow. Most precise results can be obtained by models described at the implementation level, as they accurately reflect the functional/timing behavior and the structure of the resulting circuit. These models consist of a list of...
Organizations face the issue of how to best allocate their security resources. Thus, they need an accurate method for assessing how many new vulnerabilities will be reported for the operating systems (OSs) they use in a given time period. Our approach consists of clustering vulnerabilities by leveraging the text information within vulnerability records, and then simulating the mean value function...
Stabilization is a key dependability property for dealing with unanticipated transient faults, as it guarantees that even in the presence of such faults, the system will recover to states where it satisfies its specification. One of the desirable attributes of stabilization is the use of bounded space for each variable.In this paper, we present an algorithm that transforms a stabilizingprogram that...
When provided with more powerful or extra hardware, state-of-the-art Byzantine fault-tolerant (BFT) agreement protocols are unable to effectively exploit the additional computing resources: On the one hand, in settings with heterogeneous servers existing protocols cannot fully utilize servers with higher performance capabilities. On the other hand, using more servers than the minimum number of replicas...
As the number of components in high-performance computing (HPC) systems continues to grow, the number of vehicles for soft errors will rise in parallel. Petascale research has shown that soft errors on supercomputers can occur as frequently as multiple times per day, and this rate will only increase with the exascale era. Due to this frequency, the resilience community has taken an interest in algorithmic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.