Technische Universitat Dortmund

Displaying 1-40 of 42 results

  • White Papers // May 2014

    Resource-Aware Replication on Heterogeneous Multicores: Challenges and Opportunities

    Commercial-Off-The-Shelf (COTS) hardware components are becoming more powerful and complex with every hardware generation. Decreasing transistor sizes are an enabler for these developments, because vendors can now add ever more functional units with lower energy consumption. The downside of this development is that processors become more vulnerable to permanent and...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2014

    DreamServer: Truly On-Demand Cloud Services

    Today's cloud offerings, while promising flexibility, fail to deliver this flexibility to lower-end services with frequent, minute-long idle times. The authors present DreamServer, an architecture and combination of technologies to deploy virtualized services just-in-time: virtualized web applications are suspended when idle and resurrected only when the next request arrives. They...

    Provided By Technische Universitat Dortmund

  • White Papers // Jan 2014

    Auto-Scaling Techniques for Elastic Data Stream Processing

    An elastic data stream processing system is able to handle changes in workload by dynamically scaling out and scaling in. This allows for handling of unexpected load spikes without the need for constant over provisioning. One of the major challenges for an elastic system is to find the right point...

    Provided By Technische Universitat Dortmund

  • White Papers // Nov 2013

    Selective Core Boosting: The Return of the Turbo Button

    Several modern multi-core architectures support the dynamic control of the CPU's clock rate, allowing processor cores to temporarily operate at speeds exceeding the operational base frequency. Conversely, cores can operate at a lower speed or be disabled altogether to save power. Such facilities are notably provided by Intel's turbo boost...

    Provided By Technische Universitat Dortmund

  • White Papers // Aug 2013

    Dsync: Efficient Block-Wise Synchronization of Multi-Gigabyte Binary Data

    Backing up important data is an essential task for system administrators to protect against all kinds of failures. However, traditional tools like rsync exhibit poor performance in the face of today's typical data sizes of hundreds of gigabytes. The authors address the problem of efficient, periodic, multi-gigabyte state synchronization. In...

    Provided By Technische Universitat Dortmund

  • White Papers // Jul 2013

    peaCS - Performance and Efficiency Analysis for Cloud Storage

    Those who need to store larger amounts of data either for burst periods or for convenient synchronization between devices are currently looking at new ways of how to integrate cloud storage services into the data processing applications. The benefits (on-demand access and pricing, elasticity) and the drawbacks (reduced control, increased...

    Provided By Technische Universitat Dortmund

  • White Papers // Jul 2013

    Bringing Linear Algebra Objects to Life in a Column-Oriented In-Memory Database

    Large numeric matrices and multidimensional data arrays appear in many science domains, as well as in applications of financial and business warehousing. Common applications include eigenvalue determination of large matrices, which decompose into a set of linear algebra operations. With the rise of in-memory databases it is now feasible to...

    Provided By Technische Universitat Dortmund

  • White Papers // Jul 2013

    Elastic Complex Event Processing under Varying Query Load

    Distributed data stream processing systems, like Twitter storm or Yahoo! S4, have been primarily focusing on adapting to varying event rates. However, as these systems are becoming increasingly multi-tenant, adaptation to the varying query load is becoming an equally important problem. In this paper the authors present FUGU - an...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2013

    Operating the Cloud from Inside Out

    Virtual Machine (VM) images and instances in cloud computing centers are typically designed as isolation containers for applications, databases and networking functions. In order to build complex distributed applications, multiple virtual machines must be connected, orchestrated and combined with platform and infrastructure services from the hosting environment. There are several...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2013

    RAFT-REST - A Client-side Framework for Reliable, Adaptive and Fault-Tolerant RESTful Service Consumption

    The client/server paradigm in distributed systems leads to multi-stakeholder architectures with messages exchanged over connections between client applications and services. In practice, there are many hidden obstacles for client developers caused by unstable network connections, unavailable or faulty services or limited connectivity. Even if many frameworks and middleware solutions have...

    Provided By Technische Universitat Dortmund

  • White Papers // May 2013

    Improving Wide-area Replication Performance through Informed Leader Election and Overlay Construction

    Replication is an important building block to achieve high availability in the presence of failures. Until recently, wide-area replication with strong consistency guarantees was regarded as impractical due to performance constraints. The authors investigate how informed leader election combined with a network overlay can improve the performance of distributed consensus,...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2013

    Improving Industrial Collaboration with Linked Data and OWL

    The authors present a product-centric collaboration platform comprising partner companies and their customers. By employing the linked data principles it enables them to easily publish and retrieve information about products and to include user-generated content as well as publicly available information from the linked open data web. Information about products...

    Provided By Technische Universitat Dortmund

  • White Papers // Feb 2013

    A Versatile and Scalable Everything-as-a-Service Registry and Discovery

    Networked humans and autonomous systems rely increasingly on service-oriented architectures. Conventional systems often focus on digitally delivered web services or on business services with varying degrees of formalization. According to service integration principles, the service registry as the pivotal point between providers and consumers determines the types of services which...

    Provided By Technische Universitat Dortmund

  • White Papers // Jan 2013

    On Confidentiality-Preserving Real-Time Locking Protocols

    Coordinating access to shared resources is a challenging task, in particular if real-time and security aspects have to be integrated into the same system. However, rather than exacerbating the problem, the authors found that considering real-time guarantees actually simplifies the security problem of preventing information leakage over shared-resource covert channels....

    Provided By Technische Universitat Dortmund

  • White Papers // Sep 2012

    Memory Performance at Reduced CPU Clock Speeds: An Analysis of Current x86_64 Processors

    Reducing CPU frequency and voltage is a well-known approach to reduce the energy consumption of memory-bound applications. This is based on the conception that main memory performance sees little or no degradation at reduced processor clock speeds, while power consumption decreases significantly. The authors study this effect in detail on...

    Provided By Technische Universitat Dortmund

  • White Papers // Aug 2012

    Who Watches the Watchmen? - Protecting Operating System Reliability Mechanisms

    The authors present the design and initial evaluation of a resilient operating system architecture that leverages HW architectures combining few resilient with many non-resilient CPU cores. To this end, they build their system around a Reliable Computing Base (RCB) consisting of those software components that must work for reliable operation,...

    Provided By Technische Universitat Dortmund

  • White Papers // May 2012

    Aggregation of Variables in Load Models for Interference-Coupled Cellular Data Networks

    In order to meet increasing traffic demands, future generations of cellular networks are characterized by decreasing cell sizes at full frequency reuse. Due to inevitable inter-cell interference, load conditions in neighboring cells can no longer be considered independent. Unfortunately, the adequate flow level model for such a setup is analytically...

    Provided By Technische Universitat Dortmund

  • White Papers // Mar 2012

    Generalized Mutual Information of MIMO SC-FDMA With Mismatched Receivers

    The authors investigate simplified, yet mismatched receivers for SC-FDMA MIMO transmission, currently employed in the 3GPP LTE-Advanced uplink. The receivers are based on frequency domain equalization and time domain detection. Rates, achievable by those mismatched receivers with arbitrary input alphabets are derived in terms of generalized mutual information. The results...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Fast Virtual Machine Resume for Agile Cloud Services

    Resuming virtual machines is an important management operation in the virtualized data center. (Re)- instantiating VMs as quickly as possible helps to combat flash crowds and provide true on-demand services. Unfortunately, resuming a VM currently takes tens of seconds, depending on the VM's size and available disk I/O bandwidth. Because...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Automatically Tolerating Arbitrary Faults in Non-malicious Settings

    Arbitrary faults such as bit flips have been often observed in commodity-hardware data centers and have disrupted large services. Benign faults, such as crashes and message omissions, are nevertheless the standard assumption in practical fault-tolerant distributed systems. Algorithms tolerant to arbitrary faults are harder to understand and more expensive to...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Handling Crash and Software Faults Efficiently in Distributed Event Stream Processing

    Active replication is a common approach to handle failures in distributed systems, including Event Stream Processing (ESP) systems. However, one weakness of conventional active replication is that replicas, being equal and in the same state, are susceptible to common-mode crashes due to software bugs. The authors propose a new approach...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    ANB- and ANBDmem-Encoding: Detecting Hardware Errors in Software

    It is expected that commodity hardware is becoming less reliable because of the continuously decreasing feature sizes of integrated circuits. Nevertheless, more and more commodity hardware with insufficient error detection is used in critical applications. One possible solution is to detect hardware errors in software using arithmetic AN-codes. These codes...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Robustness and Security Hardening of COTS Software Libraries

    COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and security. The authors propose a novel approach to harden software libraries to improve their robustness and security. Their approach is automated, general and extensible...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Hardware Failure Virtualization Via Software Encoded Processing

    In future, the decreasing feature size will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in the reliability of microprocessors being tuned for the commodity market. Dedicated reliable hardware is very expensive and usually slower than commodity hardware. Thus, Software Implemented Hardware Fault...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Software Protection Mechanisms for Dependable Systems

    The authors expect that in future commodity hardware will be used in safety critical applications. But the used commodity microprocessors will become less reliable because of decreasing feature size and reduced power supply. Thus software-implemented approaches to deal with unreliable hardware will be required. As one basic step to Software...

    Provided By Technische Universitat Dortmund

  • White Papers // Sep 2011

    Performance Evaluation of PLC Over the IEC 61851 Control Pilot Signal

    Powerline Communications is the proposed ISO/OSI layer 1 and 2 technology of the ISO/IEC 15118 joint working group for the Vehicle-to-Grid Communication Interface in case of conductive charging. This paper introduces a test bed for analyzing PLC in the context of V2G communication. It presents measurement results and first experiences...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2011

    Boundless Memory Allocations for Memory Safety and High Availability

    Spatial memory errors (like buffer overflows) are still a major threat for applications written in C. Most recent work focuses on memory safety - when a memory error is detected at runtime, the application is aborted. The authors' goal is not only to increase the memory safety of applications but...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2011

    JVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components

    The Virtual Private File System (VPFS) was built to protect confidentiality and integrity of application data against strong attacks. To minimize the trusted computing base (i.e., the attack surface) it was built as a stacked file system, where a small isolated component in a microkernel-based system reuses a potentially large...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2011

    Flat but Trustworthy: Security Aspects in Flattened Hierarchical Scheduling

    Virtualization is a well-proven technology for consolidating desktop and server applications onto the same hardware platform while maintaining their native environments. However, although embedded real-time systems start to adopt this technology, constrained resources and strict timeliness demands complicate this consolidation task, in particular if some applications are more critical than...

    Provided By Technische Universitat Dortmund

  • White Papers // Nov 2010

    Virtual Processors as Kernel Interface

    After virtualization has gained traction in a variety of fields ranging from the desktop computer to datacenter servers, it is likely to make inroads into embedded systems as well. The complexity of a VM implementation depends on the virtualization abilities of the processor used. Unfortunately, the instruction set architecture of...

    Provided By Technische Universitat Dortmund

  • White Papers // Nov 2010

    Towards Modular Security-conscious Virtual Machines

    Many system-level concerns such as security and support for real-time workloads are hard to address in existing systems, especially if one of the main platform assets is backward compatibility. Apart from many other applications, virtualization has proven capable in running legacy software. If done right, it may relieve systems developers...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2010

    Low-Overhead Fault Tolerance for High-Throughput Data Processing Systems

    The MapReduce programming paradigm proved to be a useful approach for building highly scalable data processing systems. One important reason for its success is simplicity, including the fault tolerance mechanisms. However, this simplicity comes at a price: efficiency. MapReduce's fault tolerance scheme stores too much intermediate information on disk. This...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2010

    Active Replication at (almost) No Cost

    MapReduce has become a popular programming paradigm in the domain of batch processing systems. Its simplicity allows applications to be highly scalable and to be easily deployed on large clusters. More recently, the MapReduce approach has been also applied to Event Stream Processing (ESP) systems. This approach, which the authors...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2010

    NOVA: A Microhypervisor-Based Secure Virtualization Architecture

    The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve platform-resource utilization and reduce the total cost of ownership. However, today's virtualization stacks are unduly large and therefore prone to attacks. If an...

    Provided By Technische Universitat Dortmund

  • White Papers // Oct 2009

    A Low-Complexity Algorithm for Uplink Scheduling in Cooperative Cellular Networks with a Capacity-Constrained Backhaul Infrastructure

    Today, it is well understood that interference poses the main capacity limitation and thus challenge for future cellular networks. A promising concept that addresses interference is multi-cell cooperative signal processing, often referred to as network MIMO. While in recent publications, it is often assumed that the required exchange of information...

    Provided By Technische Universitat Dortmund

  • White Papers // Sep 2009

    A Smart Communication Infrastructure for Future Energy System Applications

    The use of the Internet in conjunction with Web-based technologies provides potentials for optimizing the operation of distributed energy systems. Both energy providers as well as energy consumers benefit from innovations in Information and Communication Technologies (ICT). By communicating all relevant processes, like meter reading, grid monitoring and management, to...

    Provided By Technische Universitat Dortmund

  • White Papers // Jul 2009

    Perspectives on Semantic Business Process Modeling - A Generic Approach

    With the rise of SOA advance, organizations require methods and tools to analyze services regarding their fit to the needs of an institution. Research on the evaluation and selection of services has mainly adopted a non-functional perspective so far. Hence, in this paper, the authors propose a framework for analyzing...

    Provided By Technische Universitat Dortmund

  • White Papers // May 2009

    Automatic Monitoring of Logistics Processes Using Distributed RFID Based Event Data

    Decreasing sizes and a static decline in production costs are fostering the use of RFID tags and sensors in cross-company logistics networks. Additionally, the EPCIS specification comprises interface standards for capturing and querying RFID based event data and storing it in a standardized data format. This paper examines the potential...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2009

    On the Modelling of an Agent's Epistemic State and Its Dynamic Changes

    Given a set of unquantified conditionals considered as default rules or a set of quantified conditionals such as probabilistic rules, an agent can build up its internal epistemic state from such a knowledge base by inductive reasoning techniques. Besides certain (logical) knowledge, epistemic states are supposed to allow the representation...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2007

    Energy-Aware Scheduling for Infrastructure Clouds

    More and more data centers are built, consuming ever more kilo watts of energy. Over the years, energy has become a dominant cost factor for data center operators. Utilizing low-power idle modes is an immediate remedy to reduce data center power consumption. The authors use simulation to quantify the difference...

    Provided By Technische Universitat Dortmund

  • White Papers // Sep 2012

    Memory Performance at Reduced CPU Clock Speeds: An Analysis of Current x86_64 Processors

    Reducing CPU frequency and voltage is a well-known approach to reduce the energy consumption of memory-bound applications. This is based on the conception that main memory performance sees little or no degradation at reduced processor clock speeds, while power consumption decreases significantly. The authors study this effect in detail on...

    Provided By Technische Universitat Dortmund

  • White Papers // Aug 2012

    Who Watches the Watchmen? - Protecting Operating System Reliability Mechanisms

    The authors present the design and initial evaluation of a resilient operating system architecture that leverages HW architectures combining few resilient with many non-resilient CPU cores. To this end, they build their system around a Reliable Computing Base (RCB) consisting of those software components that must work for reliable operation,...

    Provided By Technische Universitat Dortmund

  • White Papers // Oct 2009

    A Low-Complexity Algorithm for Uplink Scheduling in Cooperative Cellular Networks with a Capacity-Constrained Backhaul Infrastructure

    Today, it is well understood that interference poses the main capacity limitation and thus challenge for future cellular networks. A promising concept that addresses interference is multi-cell cooperative signal processing, often referred to as network MIMO. While in recent publications, it is often assumed that the required exchange of information...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2010

    NOVA: A Microhypervisor-Based Secure Virtualization Architecture

    The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve platform-resource utilization and reduce the total cost of ownership. However, today's virtualization stacks are unduly large and therefore prone to attacks. If an...

    Provided By Technische Universitat Dortmund

  • White Papers // Sep 2009

    A Smart Communication Infrastructure for Future Energy System Applications

    The use of the Internet in conjunction with Web-based technologies provides potentials for optimizing the operation of distributed energy systems. Both energy providers as well as energy consumers benefit from innovations in Information and Communication Technologies (ICT). By communicating all relevant processes, like meter reading, grid monitoring and management, to...

    Provided By Technische Universitat Dortmund

  • White Papers // Sep 2011

    Performance Evaluation of PLC Over the IEC 61851 Control Pilot Signal

    Powerline Communications is the proposed ISO/OSI layer 1 and 2 technology of the ISO/IEC 15118 joint working group for the Vehicle-to-Grid Communication Interface in case of conductive charging. This paper introduces a test bed for analyzing PLC in the context of V2G communication. It presents measurement results and first experiences...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2009

    On the Modelling of an Agent's Epistemic State and Its Dynamic Changes

    Given a set of unquantified conditionals considered as default rules or a set of quantified conditionals such as probabilistic rules, an agent can build up its internal epistemic state from such a knowledge base by inductive reasoning techniques. Besides certain (logical) knowledge, epistemic states are supposed to allow the representation...

    Provided By Technische Universitat Dortmund

  • White Papers // May 2012

    Aggregation of Variables in Load Models for Interference-Coupled Cellular Data Networks

    In order to meet increasing traffic demands, future generations of cellular networks are characterized by decreasing cell sizes at full frequency reuse. Due to inevitable inter-cell interference, load conditions in neighboring cells can no longer be considered independent. Unfortunately, the adequate flow level model for such a setup is analytically...

    Provided By Technische Universitat Dortmund

  • White Papers // Mar 2012

    Generalized Mutual Information of MIMO SC-FDMA With Mismatched Receivers

    The authors investigate simplified, yet mismatched receivers for SC-FDMA MIMO transmission, currently employed in the 3GPP LTE-Advanced uplink. The receivers are based on frequency domain equalization and time domain detection. Rates, achievable by those mismatched receivers with arbitrary input alphabets are derived in terms of generalized mutual information. The results...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2014

    DreamServer: Truly On-Demand Cloud Services

    Today's cloud offerings, while promising flexibility, fail to deliver this flexibility to lower-end services with frequent, minute-long idle times. The authors present DreamServer, an architecture and combination of technologies to deploy virtualized services just-in-time: virtualized web applications are suspended when idle and resurrected only when the next request arrives. They...

    Provided By Technische Universitat Dortmund

  • White Papers // Jan 2014

    Auto-Scaling Techniques for Elastic Data Stream Processing

    An elastic data stream processing system is able to handle changes in workload by dynamically scaling out and scaling in. This allows for handling of unexpected load spikes without the need for constant over provisioning. One of the major challenges for an elastic system is to find the right point...

    Provided By Technische Universitat Dortmund

  • White Papers // Nov 2013

    Selective Core Boosting: The Return of the Turbo Button

    Several modern multi-core architectures support the dynamic control of the CPU's clock rate, allowing processor cores to temporarily operate at speeds exceeding the operational base frequency. Conversely, cores can operate at a lower speed or be disabled altogether to save power. Such facilities are notably provided by Intel's turbo boost...

    Provided By Technische Universitat Dortmund

  • White Papers // Jul 2013

    Elastic Complex Event Processing under Varying Query Load

    Distributed data stream processing systems, like Twitter storm or Yahoo! S4, have been primarily focusing on adapting to varying event rates. However, as these systems are becoming increasingly multi-tenant, adaptation to the varying query load is becoming an equally important problem. In this paper the authors present FUGU - an...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2007

    Energy-Aware Scheduling for Infrastructure Clouds

    More and more data centers are built, consuming ever more kilo watts of energy. Over the years, energy has become a dominant cost factor for data center operators. Utilizing low-power idle modes is an immediate remedy to reduce data center power consumption. The authors use simulation to quantify the difference...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Fast Virtual Machine Resume for Agile Cloud Services

    Resuming virtual machines is an important management operation in the virtualized data center. (Re)- instantiating VMs as quickly as possible helps to combat flash crowds and provide true on-demand services. Unfortunately, resuming a VM currently takes tens of seconds, depending on the VM's size and available disk I/O bandwidth. Because...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Automatically Tolerating Arbitrary Faults in Non-malicious Settings

    Arbitrary faults such as bit flips have been often observed in commodity-hardware data centers and have disrupted large services. Benign faults, such as crashes and message omissions, are nevertheless the standard assumption in practical fault-tolerant distributed systems. Algorithms tolerant to arbitrary faults are harder to understand and more expensive to...

    Provided By Technische Universitat Dortmund

  • White Papers // Aug 2013

    Dsync: Efficient Block-Wise Synchronization of Multi-Gigabyte Binary Data

    Backing up important data is an essential task for system administrators to protect against all kinds of failures. However, traditional tools like rsync exhibit poor performance in the face of today's typical data sizes of hundreds of gigabytes. The authors address the problem of efficient, periodic, multi-gigabyte state synchronization. In...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2010

    Low-Overhead Fault Tolerance for High-Throughput Data Processing Systems

    The MapReduce programming paradigm proved to be a useful approach for building highly scalable data processing systems. One important reason for its success is simplicity, including the fault tolerance mechanisms. However, this simplicity comes at a price: efficiency. MapReduce's fault tolerance scheme stores too much intermediate information on disk. This...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2011

    Boundless Memory Allocations for Memory Safety and High Availability

    Spatial memory errors (like buffer overflows) are still a major threat for applications written in C. Most recent work focuses on memory safety - when a memory error is detected at runtime, the application is aborted. The authors' goal is not only to increase the memory safety of applications but...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Handling Crash and Software Faults Efficiently in Distributed Event Stream Processing

    Active replication is a common approach to handle failures in distributed systems, including Event Stream Processing (ESP) systems. However, one weakness of conventional active replication is that replicas, being equal and in the same state, are susceptible to common-mode crashes due to software bugs. The authors propose a new approach...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    ANB- and ANBDmem-Encoding: Detecting Hardware Errors in Software

    It is expected that commodity hardware is becoming less reliable because of the continuously decreasing feature sizes of integrated circuits. Nevertheless, more and more commodity hardware with insufficient error detection is used in critical applications. One possible solution is to detect hardware errors in software using arithmetic AN-codes. These codes...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2010

    Active Replication at (almost) No Cost

    MapReduce has become a popular programming paradigm in the domain of batch processing systems. Its simplicity allows applications to be highly scalable and to be easily deployed on large clusters. More recently, the MapReduce approach has been also applied to Event Stream Processing (ESP) systems. This approach, which the authors...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Robustness and Security Hardening of COTS Software Libraries

    COTS components, like software libraries, can be used to reduce the development effort. Unfortunately, many COTS components have been developed without a focus on robustness and security. The authors propose a novel approach to harden software libraries to improve their robustness and security. Their approach is automated, general and extensible...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Hardware Failure Virtualization Via Software Encoded Processing

    In future, the decreasing feature size will make it much more difficult to built reliable microprocessors. Economic pressure will most likely result in the reliability of microprocessors being tuned for the commodity market. Dedicated reliable hardware is very expensive and usually slower than commodity hardware. Thus, Software Implemented Hardware Fault...

    Provided By Technische Universitat Dortmund

  • White Papers // Dec 2011

    Software Protection Mechanisms for Dependable Systems

    The authors expect that in future commodity hardware will be used in safety critical applications. But the used commodity microprocessors will become less reliable because of decreasing feature size and reduced power supply. Thus software-implemented approaches to deal with unreliable hardware will be required. As one basic step to Software...

    Provided By Technische Universitat Dortmund

  • White Papers // Jan 2013

    On Confidentiality-Preserving Real-Time Locking Protocols

    Coordinating access to shared resources is a challenging task, in particular if real-time and security aspects have to be integrated into the same system. However, rather than exacerbating the problem, the authors found that considering real-time guarantees actually simplifies the security problem of preventing information leakage over shared-resource covert channels....

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2011

    Flat but Trustworthy: Security Aspects in Flattened Hierarchical Scheduling

    Virtualization is a well-proven technology for consolidating desktop and server applications onto the same hardware platform while maintaining their native environments. However, although embedded real-time systems start to adopt this technology, constrained resources and strict timeliness demands complicate this consolidation task, in particular if some applications are more critical than...

    Provided By Technische Universitat Dortmund

  • White Papers // Apr 2013

    Improving Industrial Collaboration with Linked Data and OWL

    The authors present a product-centric collaboration platform comprising partner companies and their customers. By employing the linked data principles it enables them to easily publish and retrieve information about products and to include user-generated content as well as publicly available information from the linked open data web. Information about products...

    Provided By Technische Universitat Dortmund

  • White Papers // May 2009

    Automatic Monitoring of Logistics Processes Using Distributed RFID Based Event Data

    Decreasing sizes and a static decline in production costs are fostering the use of RFID tags and sensors in cross-company logistics networks. Additionally, the EPCIS specification comprises interface standards for capturing and querying RFID based event data and storing it in a standardized data format. This paper examines the potential...

    Provided By Technische Universitat Dortmund

  • White Papers // Jul 2013

    Bringing Linear Algebra Objects to Life in a Column-Oriented In-Memory Database

    Large numeric matrices and multidimensional data arrays appear in many science domains, as well as in applications of financial and business warehousing. Common applications include eigenvalue determination of large matrices, which decompose into a set of linear algebra operations. With the rise of in-memory databases it is now feasible to...

    Provided By Technische Universitat Dortmund

  • White Papers // May 2013

    Improving Wide-area Replication Performance through Informed Leader Election and Overlay Construction

    Replication is an important building block to achieve high availability in the presence of failures. Until recently, wide-area replication with strong consistency guarantees was regarded as impractical due to performance constraints. The authors investigate how informed leader election combined with a network overlay can improve the performance of distributed consensus,...

    Provided By Technische Universitat Dortmund

  • White Papers // Feb 2013

    A Versatile and Scalable Everything-as-a-Service Registry and Discovery

    Networked humans and autonomous systems rely increasingly on service-oriented architectures. Conventional systems often focus on digitally delivered web services or on business services with varying degrees of formalization. According to service integration principles, the service registry as the pivotal point between providers and consumers determines the types of services which...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2013

    RAFT-REST - A Client-side Framework for Reliable, Adaptive and Fault-Tolerant RESTful Service Consumption

    The client/server paradigm in distributed systems leads to multi-stakeholder architectures with messages exchanged over connections between client applications and services. In practice, there are many hidden obstacles for client developers caused by unstable network connections, unavailable or faulty services or limited connectivity. Even if many frameworks and middleware solutions have...

    Provided By Technische Universitat Dortmund

  • White Papers // Oct 2006

    Slice-Balancing H.264 Video Encoding for Improved Scalability of Multicore Decoding

    With multicore architectures being introduced to the market, the research community is revisiting problems to evaluate them under the new preconditions set by those new systems. Algorithms need to be implemented with scalability in mind. One problem that is known to be computationally demanding is video decoding. In this paper,...

    Provided By Technische Universitat Dortmund

  • White Papers // Jul 2013

    peaCS - Performance and Efficiency Analysis for Cloud Storage

    Those who need to store larger amounts of data either for burst periods or for convenient synchronization between devices are currently looking at new ways of how to integrate cloud storage services into the data processing applications. The benefits (on-demand access and pricing, elasticity) and the drawbacks (reduced control, increased...

    Provided By Technische Universitat Dortmund

  • White Papers // May 2007

    OSLO: Improving the security of Trusted Computing

    In this paper, the authors describe bugs and ways to attack trusted computing systems based on a static root of trust such as Microsoft's Bit-locker. They propose to use the dynamic root of trust feature of newer x86 processors as this shortens the trust chain, can minimize the Trusted Computing...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2011

    JVPFS: Adding Robustness to a Secure Stacked File System with Untrusted Local Storage Components

    The Virtual Private File System (VPFS) was built to protect confidentiality and integrity of application data against strong attacks. To minimize the trusted computing base (i.e., the attack surface) it was built as a stacked file system, where a small isolated component in a microkernel-based system reuses a potentially large...

    Provided By Technische Universitat Dortmund

  • White Papers // Jun 2013

    Operating the Cloud from Inside Out

    Virtual Machine (VM) images and instances in cloud computing centers are typically designed as isolation containers for applications, databases and networking functions. In order to build complex distributed applications, multiple virtual machines must be connected, orchestrated and combined with platform and infrastructure services from the hosting environment. There are several...

    Provided By Technische Universitat Dortmund

  • White Papers // Nov 2010

    Virtual Processors as Kernel Interface

    After virtualization has gained traction in a variety of fields ranging from the desktop computer to datacenter servers, it is likely to make inroads into embedded systems as well. The complexity of a VM implementation depends on the virtualization abilities of the processor used. Unfortunately, the instruction set architecture of...

    Provided By Technische Universitat Dortmund

  • White Papers // Nov 2010

    Towards Modular Security-conscious Virtual Machines

    Many system-level concerns such as security and support for real-time workloads are hard to address in existing systems, especially if one of the main platform assets is backward compatibility. Apart from many other applications, virtualization has proven capable in running legacy software. If done right, it may relieve systems developers...

    Provided By Technische Universitat Dortmund