Search
Now showing items 1-100 of 155
(Research report / Forskningsrapport, 2020)
Building Confidence using Beliefs and Arguments in Security Class Evaluations for IoT (long version)
(Research report / Forskningsrapport, 2020)
We have previously proposed a security classification methodology for IoT systems and have applied it to the smart grid and smart home domain. This method departs from classical risk analysis and certification methods in ...
(Research report / Forskningsrapport, 2020)
DevSecOps is the extension of DevOps with security aspects and tools throughout all the stages of the software development life cycle. DevOps has become a popular way of developing modern software, especially in the Internet ...
(Research report / Forskningsrapport, 2020)
Technological advancements have provided wireless links with very high capacity for 5G mobile networks and WiFi 6, which will be widely deployed by 2025; however, the capacity heavily fluctuates, violating the assumption ...
(Research report / Forskningsrapport, 2019)
The GI Working Group“Programming Languages and Computing Concepts” arranges since 1984 each spring a workshop in the the “Physikzentrum Bad Honnef” (a convention centre of the German Physical Society). The meeting serves ...
(Research report / Forskningsrapport, 2019)
Internet of Things (IoT) is a growing field and its use in home automation is one of the dominating application areas. The heterogeneity and limited capacity of storage and processing power make the security of IoT systems ...
(Research report / Forskningsrapport, 2019)
Abstract—Network Utility Maximization (NUM) is a well accepted theoretical concept that describes how congestion controls could cooperate to achieve an ideal sending rate allocation, for given utility functions of senders ...
(Research report / Forskningsrapport, 2018)
Thanks to the popularity of mobile devices a large number of location-based services (LBS) have emerged. While a large number of privacy-preserving solutions for LBS have been proposed, most of these solutions do not ...
(Research report / Forskningsrapport, 2018)
The GI Working Group“Programming Languages and Computing Concepts” arranges since 1984 each spring a workshop in the the “Physikzentrum Bad Honnef” (a convention centre of the German Physical Society). The meeting serves ...
(Research report / Forskningsrapport, 2018)
(Research report / Forskningsrapport, 2018)
A multitude of weak memory models exists supporting various types of relaxations and different synchronization primitives. On one hand, they must be lax enough to allow for hardware and compiler optimizations; on the other, ...
(Research report / Forskningsrapport, 2017)
In this research report we propose a self-organizing media streaming solution that supports multiple interacting participants as well as a large number of observers. This solution is aimed at a number of emerging multimedia ...
(Research report / Forskningsrapport, 2017)
Refactoring is an essential operation in software engineering, with the purpose of improving the structural qualities of software. An emerging trend in software engineering is the use of model-driven approaches in which ...
(Research report / Forskningsrapport, 2017)
In model-driven engineering approaches, models are considered firstclass entities. The composition of models is a necessity for modelling software systems. Structural composition of models has been studied thoroughly during ...
(Research report / Forskningsrapport, 2017)
We present a representation of spatial data that supports answering of qualitative queries (involving e.g. containment and overlap), using less time than numerical computations on coordinates, and less space than explicitly ...
(Research report / Forskningsrapport, 2017)
The concrete problem this paper addresses is the following: Given a set of objects with a spatial interpretation and a set of qualitative relations, construct a bintree representation that returns the same answers to queries ...
(Research report / Forskningsrapport, 2017)
This report explains the details of a configurable index structure that allows to perform efficiently the kinds of filtering operations required to implement faceted search over RDF data. Unlike previous systems, it is ...
(Research report / Forskningsrapport, 2017)
(Research report / Forskningsrapport, 2017)
In this paper, we formalize an operational semantics of a weak memory model similar to the one in Go, concentrating on buffered writes, i.e., ignoring the possibility of buffered reads.
(Research report / Forskningsrapport / SubmittedVersion, 2017)
Less than Best Effort (LBE) transports are transport protocols that use spare bandwidth left by Best Effort (BE) transports to fulfill their own data transfer tasks. Such kind of protocols can be used by non-delay/bandwidth ...
(Research report / Forskningsrapport / PublishedVersion; Peer reviewed, 2017)
In recent years, it has come to attention that governments have been doing mass surveillance of personal communications without the consent of the citizens. As a consequence of these revelations, developers have begun ...
(Research report / Forskningsrapport, 2016)
Railway systems designs deal with complex and large-scale, safety-critical infrastructures, where formal methods play an important role, especially in verifying the safety of so-called interlockings through model checking. ...
(Research report / Forskningsrapport, 2016)
We provide a non-interleaving operational semantics for the pi-calculus as asynchronous transition systems, which generalizes the standard interleaving structural operational semantics and unfolds to standard, stable prime ...
(Research report / Forskningsrapport, 2016)
The rapidly increasing pervasiveness and integration of computers in human and animal society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs ...
(Research report / Forskningsrapport, 2016)
Modern cloud applications consist of software components deployed on multiple virtual machines. Deploying such applications is error prone and requires detailed system expertise. The deployment optimization problem is about ...
(Research report / Forskningsrapport, 2016)
Identity and authentication solutions often lack usability and scalability, or do not provide high enough authentication assurance. The concept of Lucidman (Local User-Centric Identity Management) is an approach to providing ...
(Research report / Forskningsrapport / PublishedVersionAcceptedVersionPublishedVersionAcceptedVersion; Peer reviewed, 2016)
The rapidly increasing pervasiveness and integration of computers in human and animal society calls for a broad discipline under which this development can be studied. We argue that to design and use technology one needs ...
(Research report / Forskningsrapport / PublishedVersion, 2016)
Client platform infection poses a significant threat to secure user authentication. Com- bining vulnerable client platforms with special security devices, as often the case in e- banking, can increase significantly the ...
(Research report / Forskningsrapport, 2015)
(Research report / Forskningsrapport, 2014)
We prove that a selection of quality of information optimisation problems related to event detection in sensor networks are NP-hard.
(Research report / Forskningsrapport, 2014)
(Research report / Forskningsrapport, 2014)
Several formal models combine probabilistic and nondeterministic features. To allow their probabilistic simulation and statistical model checking by means of pseudo-random number sampling, all sources of nondeterminism ...
(Research report / Forskningsrapport, 2014)
Unbounded data structures, advanced functions and data types, and/or different forms of communication are often needed to model large and complex probabilistic real-time systems such as wireless sensor network algorithms. ...
(Research report / Forskningsrapport, 2014)
Distributed and concurrent object-oriented systems are difficult to analyze due to the complexity of their concurrency, communication, and synchronization mechanisms. The future mechanism extends the traditional method ...
(Research report / Forskningsrapport, 2014)
Publish/subscribe (pub/sub) is a popular communication paradigm in the design of largescale distributed systems. A fundamental challenge in deploying pub/sub systems on a data center or a cloud infrastructure is efficient ...
(Research report / Forskningsrapport, 2014)
Congestion occurs at a bottleneck along an Internet path; multiple flows between the same sender and receiver pairs can benefit from using only a single congestion control instance when they share the same bottleneck. These ...
(Research report / Forskningsrapport, 2014)
PSMaude is a probabilistic extension of Maude that provides an expressive probabilistic strategy language to quantify the nondeterminism in probabilistic rewrite theories, allowing the user to specify different probabilistic ...
(Research report / Forskningsrapport, 2013)
This report investigates the possibilities of modeling OSLC Resources with Class Models, and also transforming these models into OSLC server and client code fragments that use these resources.
(Research report / Forskningsrapport, 2013)
Publish/subscribe (pub/sub) is a popular communication paradigm in the design of largescale distributed systems. A provider of a pub/sub service (whether centralized, peer-assisted, or based on a federated organization of ...
(Research report / Forskningsrapport, 2013)
We investigate the usage of a history-based specification approach for concurrent and distributed systems. In particular, we compare two approaches on checking that those systems behave according to their specification. ...
(Research report / Forskningsrapport, 2013)
Active Queue Management (AQM) design has again come into the spotlight of network operators, vendors and OS developers. This reflects the growing concern and sensitivity about the end-to-end latency perceived by today’s ...
(Research report / Forskningsrapport / SubmittedVersion; Peer reviewed, 2012)
We introduce Dynamic SOS as a framework for describing semantics of programming languages that include dynamic software upgrades. Dynamic SOS is built on top of theModular SOS of P.Mosses, with an underlying category theory ...
(Research report / Forskningsrapport, 2012)
Distributed and concurrent object-oriented systems are difficult to analyze due to the complexity of their concurrency, communication, and synchronization mechanisms. Rather than performing analysis at the code level of ...
(Research report / Forskningsrapport, 2012)
In emergency intervention and rescue operations, the coordination and collaboration of the rescue personnel is highly important for the success of the mission. Data networks formed between the devices carried by the rescue ...
(Research report / Forskningsrapport, 2012)
This report extends our behavioral type and effect system for detecting dealocks in [8] by polymorphism and formalizing type inference (wrt. the lock types. Our inference is defined for a simple concurrent, first-order ...
(Research report / Forskningsrapport, 2012)
RDF data transformations are transformations of RDF graphs to RDF graphs which preserve in different degree the data content in the source to the target. These transformation therefore give special attention to the data ...
(Research report / Forskningsrapport, 2011)
Feil nr (409) på tittelbladet. Skal være Research report nr 406.
(Research report / Forskningsrapport, 2011)
We present an effect based static analysis to calculate upper and lower bounds on the memory resource consumption in a transactional calculus. The calculus is a concurrent variant of Featherweight Java extended by transactional ...
(Research report / Forskningsrapport, 2011)
The aim of the workshop is to bring together practitioners and researchers from academia, industry and government to present and discuss ideas about:
• How to deal with the complexity of software projects by multi-view ...
(Research report / Forskningsrapport, 2011)
We study three timed extensions of Petri nets. We demonstrate methods for transforming these types of Petri nets into Real-Time Maude programs. This lays the groundwork for a timed Petri net analysis tool in which these ...
(Research report / Forskningsrapport, 2011)
We propose a novel approach to the well-studied problem of making a nite, ordered sequence of decisions under uncertainty. Most existing work in this area concentrates on graphical representations of decision problems, ...
(Research report / Forskningsrapport, 2011)
(Research report / Forskningsrapport, 2011)
Hybrid systems are systems that exhibit both discrete and continuous behavior. Reachability, the question of whether a system in one state can reach some other state, is undecidable for hybrid systems in general. The ...
(Research report / Forskningsrapport, 2011)
Deadlocks are a common error in programs with lock-based concurrency and are hard to avoid or even to detect. One way for deadlock prevention is to statically analyze the program code to spot sources of potential deadlocks. ...
(Research report / Forskningsrapport, 2011)
Risk analysis is an important tool for developers to establish the appropriate protection level of a system. Unfortunately, the shifting environment of components and component-based systems is not adequately addressed by ...
(Research report / Forskningsrapport, 2010)
In this paper, we propose a probabilistic extension of the Creol modeling language, called PCreol, for which we give the operational semantics in Probabilistic Rewrite Logic. We give details on the implementation of a ...
(Research report / Forskningsrapport, 2010)
iRefIndex provides an index of protein interactions available in a number of primary interaction databases. This index allows the user to search for a protein and retrieve a non-redundant list of interactors for that ...
(Research report / Forskningsrapport, 2010)
Modular system development causes challenges for security and safety as upgraded subcomponents may interact with the system in unforeseen ways. Due to their lack of modularity, conventional risk analysis methods are poorly ...
(Research report / Forskningsrapport, 2010)
We present a partial correctness proof system for ABS, an imperative, concurrent and object-oriented language which provides asynchronous communication model that is suitable for loosely coupled objects in the distributed ...
(Research report / Forskningsrapport, 2010)
Biomolecular interaction data is an increasingly important bioinformatics dataset used to examine biological systems. However, these data are spread across multiple databases and expressed in disparate data structures and ...
(Research report / Forskningsrapport, 2009)
Transactions are a high-level alternative for low-level concurrencycontrol mechanisms such as locks, semaphores, monitors. A recent proposal for integrating transactional features into programming languages is Transactional ...
(Research report / Forskningsrapport, 2009)
Double eigenvalues are not generic for matrices without any particular structure. A matrix depending linearly on a scalar parameter, A+ mu B, will however generically have double eigenvalues for some values of the parameter ...
(Research report / Forskningsrapport, 2008)
UML sequence diagrams partially describe a system. We show how the description may be augmented with exceptions triggered by the violation of timing constraints and compare our approach to those of the UML 2.1 simple time ...
(Research report / Forskningsrapport, 2008)
Polygonal hybrid systems (SPDIs) are planar hybrid systems, whose dynamics are defined in terms of constant differential inclusions, one for each of a number of polygonal regions partitioning the plane. The reachability ...
(Research report / Forskningsrapport, 2008)
Creol is a high-level, object-oriented language for distributed systems, featuring active objects and asynchronous method calls. In this paper we present a behavioral interface speci cation language over communication trace ...
(Research report / Forskningsrapport, 2008)
The 2nd Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS’08) is held in Malta. The aim of the workshop is to bring together researchers and practitioners working on language-based solutions ...
(Research report / Forskningsrapport, 2008)
The work reported here is concerned with the definition of a logic (which we call CL) for reasoning about legal contracts. The report presents the syntax of the logic and the associated semantics. There are two semantics ...
(Research report / Forskningsrapport, 2007)
(Research report / Forskningsrapport, 2007)
Mobile Ad-Hoc Networks (MANETs) are an important communication infrastructure to support emergency and rescue operations. To address the frequent disconnections and network partitions that might occur, we have developed a ...
(Research report / Forskningsrapport, 2007)
(Research report / Forskningsrapport, 2007)
Soft real-time requirements are often related to communication in distributed systems. Therefore it is interesting to understand how UML sequence diagrams can be used to specify such requirements. We propose a way of ...
(Research report / Forskningsrapport, 2007)
In this report we explore aspect-oriented modeling for UML 2.0 sequence diagrams. We ensure that the aspect weaving is semantics-based by using a formal trace model for sequence diagrams. A major challenge is to handle ...
(Research report / Forskningsrapport, 2007)
UML sequence diagrams is a specification language that has proved itself to be of great value in system development. When put to applications such as simulation, testing and other kinds of automated analysis there is a ...
(Research report / Forskningsrapport, 2007)
Mobile Ad-Hoc Networks maintain information about reachable nodes in the routing table. In many application scenarios, human groups play an important role. This is visible at the network level as independent network ...
(Research report / Forskningsrapport, 2007)
Having a sequence diagram specification and a computer system, we need to answer the question: Is the system compliant with the sequence diagram specification in the desired way? We present a procedure for answering this ...
(Research report / Forskningsrapport, 2007)
Having a sequence diagram specification and a computer system, we need to answer the question: Is the system compliant with the sequence diagram specification in the desired way? We present a procedure for answering this ...
(Research report / Forskningsrapport, 2007)
(Research report / Forskningsrapport, 2007)
This paper formalizes the observable interface behavior of an concurrent, objectoriented language with futures and promises. The calculus captures the core of Creol, a language, featuring in particular asynchronous method ...
(Research report / Forskningsrapport, 2007)
(Research report / Forskningsrapport, 2007)
During the past decade, the telecommunication environment has evolved from single operator featuring voice services to multi-operator featuring a range of different types of services. Services are being provided today in ...
(Research report / Forskningsrapport, 2007)
STAIRS is a method for the compositional development of interactions in the setting of UML 2.0. In addition to defining denotational trace semantics for the main aspects of interactions, STAIRS focuses on how interactions ...
(Research report / Forskningsrapport, 2007)
This analysis of the audio quality of DAB has been made independently of the broadcasting companies and aims at balancing their information.
Through measurement of the audio signal and through informal listening, we have ...
(Research report / Forskningsrapport, 2007)
The throughput of a possible future fixed wireless access multiple-input multiple-output (MIMO) system operating at high frequencies is investigated. We extend our previous theoretical work on MIMO for line-of-sight (LOS) ...
(Research report / Forskningsrapport, 2007)
Late binding allows flexible code reuse but complicates formal reasoning significantly, as a method call’s receiver class is not statically known. This is especially true when programs are incrementally developed by extending ...
(Research report / Forskningsrapport, 2007)
This paper presents a case study evaluating the use of STAIRS when specifying a system for connecting service providers and people requesting those services. As part of the case study, we give an example of how STAIRS may ...
(Research report / Forskningsrapport, 2007)
The coordination and collaboration of the personnel from various organisations involved in a rescue operation is important for a successful operation. Data networks can facilitate effective collaboration by providing an ...
(Research report / Forskningsrapport, 2007)
The integration of XML documents in object-oriented programming languages is becoming paramount with the advent of the use of Internet in new applications like web services. Such integration is not easy in general and ...
(Research report / Forskningsrapport, 2007)
STAIRS is an approach to the compositional development of UML interactions, such as sequence diagrams and interaction overview diagrams. An important aspect of STAIRS is the ability to distinguish between underspecification ...
(Research report / Forskningsrapport, 2007)
Current object-oriented approaches to distributed programs may be criticized in several respects. First, method calls are generally synchronous, which leads to much waiting in distributed and unstable networks. Second, the ...
(Research report / Forskningsrapport, 2007)
This paper describes a technique for realizing a high-rank channel matrix in a line-of-sight (LOS) multiple-input multiple-output (MIMO) transmission scenario. This is beneficial for systems which are unable to make use ...
(Research report / Forskningsrapport, 2006)
STAIRS is an approach to the compositional development of sequence diagrams supporting the specification of mandatory as well as potential behavior. In order to express the necessary distinction between black-box and ...
(Research report / Forskningsrapport, 2006)
(Research report / Forskningsrapport, 2006)
(Research report / Forskningsrapport, 2006)
We study two simple multiresoultion analyses and their stability in the L1-norm: Faber decomposition and C1 quadratic Hermite interpolation, both with nonuniform knot sequences. The use of the L1 norm is natural in many ...
(Research report / Forskningsrapport, 2006)
The trends over the recent years show an increase in streaming media transported across the Internet in addition to al- ready abundant web traffic, increasing the need for distri- bution schemes that efficiently handle ...
(Research report / Forskningsrapport, 2006)
We propose a semantic paradigm for component-based specification supporting the documentation of security risk behaviour. By security risk, we mean behaviour that constitutes a risk with regard to ICT security aspects, ...
(Research report / Forskningsrapport, 2006)
In this paper, elements of network simulations are identified and defined to provide a clear terminology for discourse on network simulators. Then we identify the two stakeholders involved in conducting network simulation ...
(Research report / Forskningsrapport, 2006)
(Research report / Forskningsrapport, 2006)
The Ad Hoc Routing Protocol with Cellular Assistance is intended to be used for high-bandwidth streaming on a heterogeneous 3G-cellular and Ad Hoc IEEE 802.11 network architecture. This report describes the protocol in ...
(Research report / Forskningsrapport, 2006)
Nondeterminism in specifications may be used for at least two different purposes. One is to express underspecification, which means that the specifier for the same environment behavior allows several alternative behaviors ...