226 result(s)
Page Size: 10, 20, 50
Export: bibtex, xml, json, csv
Order by:

CNR Author operator: and / or
more
Typology operator: and / or
Language operator: and / or
Date operator: and / or
more
Rights operator: and / or
2005 Journal article Restricted
A hierarchical radio resource management framework for integrating WLANs in cellular networking environments
Karetsos G. T., Kyriazakos S. A., Groustiotis E., Di Giandomenico F., Mura I.
Over the last few years wireless local area networking (WLAN) has become a very important technology that offers high-speed communication services to mobile users in indoor environments. WLAN technology offers some very attractive characteristics such as high data rates, increased QoS capabilities, and low installation costs which has made many professionals claim that it will be the main opponent of IMT- 2000, despite the enormous effort needed for the specification and implementation of 3G systems. However, WLANs also present many important constraints related mainly to their restricted coverage capabilities. On the other hand, 3G systems are deployed gradually and carefully since their business prospects have not been validated yet and it is expected that 2G and 2G+ cellular systems will continue to play an important role for at least five more years. Thus, today's wireless networking environment is in fact a conglomeration of all these technologies for which there is a strong need for cooperation. In this article we describe a heterogeneous wireless networking environment together with its features and user requirements. We explain the importance of the existence of WLANs and describe a framework and system architecture that support seamless integration of WLAN in heterogeneous cellular networking environments, focusing on support for efficient resource provision and management.Source: IEEE wireless communications 12 (2005): 11–17. doi:10.1109/MWC.2005.1561940
DOI: 10.1109/mwc.2005.1561940
Metrics:


See at: IEEE Wireless Communications Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA


2008 Contribution to conference Restricted
Architecting dependable systems V - Preface
De Lemos R., Di Giandomenico F., Gacek C., Muccini H., Vieira M.
This is the fifth book in a series on Architecting Dependable Systems we started six years ago that brings together issues related to software architectures and the dependability of systems. This book includes expanded and peer-reviewed papers based on the selected contributions to two workshops, and a number of invited papers written by recognized experts in the area. The two workshops were: the Workshop on Architecting Dependable Systems (WADS) organized at the 2007 International Conference on Dependable Systems and Networks (DSN 2007), and the Third Workshop on the Role of Software Architecture for Testing and Analysis organized as part of a federated conference on Component-Based Software Engineering and Software Architecture (CompArch 2007).DOI: 10.1007/978-3-540-85571-2
Metrics:


See at: link.springer.com Restricted | CNR ExploRA


2009 Journal article Closed Access
A decomposition-based modeling framework for complex systems
Lollini P., Bondavalli A., Di Giandomenico F.
Stochastic model-based approaches are widely used for performability evaluation of complex software/hardware systems. Many techniques have been developed to mitigate the complexity of the associated models, but most of them are domain-specific, and they support the analysis of a limited class of systems. This paper provides a contribution in the definition of a general modeling framework that adopts three different types of decomposition techniques to deal with model complexity. First, a functional decomposition is applied at the system-level, thus identifying a set of subsystems, called entities, each one performing a function with respect to the validation objectives. The entities can interact with each other through some dependency relations that state how the behavior of each entity can affect the other(s). Then a temporal decomposition is used to divide the system's lifetime in a sequence of phases such that two consecutive phases have at least one different dependency relation. Last, a model-level decomposition produces a set of separate sub-models that can be solved in isolation, passing some intermediate results between them, if and when required. This modeling framework has been applied to analyze a General Packet Radio Service (GPRS) mobile telephone system. The purpose of this case-study is to demonstrate the applicability of the framework, in terms of its computational complexity, and the accuracy of the obtained results. The proposed approach provides results sufficiently accurate, though it induces some acceptable approximation. Moreover, it significantly reduces the computational complexity with respect to solving the whole non-decomposed model, and shows only a slight increase in complexity with respect to the ad-hoc solution technique specifically developed for the GPRS case-study.Source: IEEE transactions on reliability 58 (2009): 20–33. doi:10.1109/TR.2008.2011663
DOI: 10.1109/tr.2008.2011663
Metrics:


See at: IEEE Transactions on Reliability Restricted | ieeexplore.ieee.org Restricted | CNR ExploRA


2006 Conference article Unknown
Critical utility infrastructural resilience
Dondossola G., Deconinck G., Di Giandomenico F., Donatelli S., Kaaniche M., Verissimo P.
The paper refers to CRUTIAL , CRitical UTility InfrastructurAL Resilience, a European project within the research area of Critical Information Infrastructure Protection, with a specific focus on the infrastructures operated by power utilities, widely recognized as fundamental to national and international economy, security and quality of life. Such infrastructures faced with the recent market deregulations and the multiple interdependencies with other infrastructures are becoming more and more vulnerable to various threats, including accidental failures and deliberate sabotage and malicious attacks. The subject of CRUTIAL research are small scale networked ICT systems used to control and manage the electric power grid, in which artifacts controlling the physical process of electricity transportation need to be connected with corporate and societal applications performing management and maintenance functionality. The peculiarity of such ICT-supported systems is that they are related to the power system dynamics and its emergency conditions. Specific effort need to be devoted by the Electric Power community and by the Information Technology community to influence the technological progress in order to allow commercial intelligent electronic devices to be effectively deployed for the protection of citizens against cyber threats to electric power management and control systems. A well-founded know-how needs to be built inside the industrial power sector to allow all the involved stakeholders to achieve their service objectives without compromising the resilience properties of the logical and physical assets that support the electric power provision.Source: International Workshop on Complex Network and Infrastructure Protection. CNIP 2006, Roma, 26-28/03/2006

See at: CNR ExploRA


2006 Contribution to conference Unknown
Critical utility infrastructural resilience
Dondossola G., Deconinck G., Di Giandomenico F., Donatelli S., Kaaniche M., Verissimo P.
The problem of security and dependability, or generically speaking, resilience [1] of Internet-oriented infrastructure systems, such as web server compounds, is reasonably well understood. Although it is not completely mastered (for example, denial of service is still a research subject), it is receiving adequate attention. However, such is not the case with the problem of resilience of critical utility infrastructures. This problem is not completely understood, mainly due to the hybrid composition of these infrastructures. The process control of utility infrastructures is based on the SCADA (Supervisory Control and Data Acquisition) systems which yield the operational ability to acquire data, supervise and control whatever is the business in question (electricity, water, gas, telecomm). However, they also have interconnections to the standard corporate intranets, and hence indirectly to the Internet (e.g., remote access via dedicated or public networks). The aforementioned SCADA systems were classically not designed to be widely distributed and remotely accessed, let alone be open. They grew-up standalone, closed, not having security in mind.....Source: Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems - CRTES 2006, San Jose, California, USA, 04/04/2006

See at: CNR ExploRA


2007 Contribution to conference Unknown
Workshop on Architecting Dependable Systems (WADS 2007)
De Lemos R., Di Giandomenico F., Gacek C.
This workshop summary gives a brief overview of the workshop on "Architecting Dependable Systems" held in conjunction with DSN 2007. The main aim of this workshop is to promote cross-fertilization between the software architecture and dependability communities. We believe that both of them will benefit from clarifying approaches that have been previously tested and have succeeded as well as those that have been tried but have not yet been shown to be successful.Source: 37th International Conference on Dependable Systems and Networks, pp. 805, Edinburgh, UK, 25-28 July, 2007

See at: CNR ExploRA


2003 Report Open Access OPEN
Managing resources in heterogeneous wireless networking environments
Kyriazakos S., Karetsos G., Di Giandomenico F., Casadeval F., Jubera M., Mura I., Tselikas N., Vlahodimitropoulos K.
The always-increasing number of the subscribers of the mobile networks and the evolving demand for advanced services pose new requirements for the underlying networking infrastructure. On the other hand radio resources are scarce and already overexploited and the existing architectures lack the flexibility that would allow easy and efficient introduction of the emerging services. These problems led us to investigate the possibility for real-time Radio Resource Management in heterogeneous wireless networking environments. In this paper we present a methodology and an approach for designing a hierarchical system that is augmenting the functionality of wireless network architectures by enforcing smooth co-operation and is capable to react when resource shortcomings appear.Source: ISTI Technical reports, 2003

See at: ISTI Repository Open Access | CNR ExploRA


2007 Contribution to conference Unknown
Preface. Workshop on Architecting Dependable Systems (WADS 2007)
De Lemos R., Di Giandomenico F., Gacek C.
This workshop summary gives a brief overview of the workshop on "Architecting Dependable Systems" held in conjunction with DSN 2007. The main aim of this workshop is to promote cross-fertilization between the software architecture and dependability communities. We believe that both of them will benefit from clarifying approaches that have been previously tested and have succeeded as well as those that have been tried but have not yet been shown to be successful.Source: 37th International Conference on Dependable Systems and Networks, Edinburgh, UK, 25-28 July 2007

See at: CNR ExploRA


2002 Report Open Access OPEN
Accurate availability estimation of GPRS
Porcarelli S., Di Giandomenico F., Bondavalli A., Barbera M., Mura I.
The General Packet Radio Service (GPRS) extends the Global System Mobile Communication (GSM), by introducing a packet-switched transmission service. This paper analyses the GPRS behavior under critical conditions. In particular, we focus on outages, which significantly impact the GPRS dependability. In fact, during outage periods the number of users trying to access the service grows proportionally over time. When the system resumes its operations, the overload caused by accumulated users determines a higher probability of collisions on resources assignment and therefore a degradation of the overall QoS. This paper adopts a Stochastic Activity Network modeling approach for evaluating the dependability of a GPRS network under outage conditions. The major contribution of this study lies in the novel perspective the dependability study is framed in. Starting from a quite classical availability analysis, the network dependability figures are incorporated into a very detailed service model that is used to analyze the overload effect that GPRS has to face after outages, gaining deep insights on its impact on user's perceived QoS. The result of this modeling is an accurate availability analysis, which takes into account not only the bare estimation of unavailability periods, but also the important congestion phenomenon following outages that contribute to service degradation for a certain period of time after operations resume.Source: ISTI Technical reports, 2002

See at: ISTI Repository Open Access | CNR ExploRA


2004 Report Open Access OPEN
A Modeling Methodology for Hierarchical Control Systems and its Application
Lollini P., Di Giandomenico F., Bondavalli A.
Current and future computerized systems and infrastructures are going to be based on the layering of different systems, designed at different times, with different technologies and components and difficult to integrate. Control systems and resource management systems are increasingly employed in such large and heterogeneous environment as a parallel infrastructure to allow an efficient, dependable and scalable usage of the system components. System complexity comes out to be a paramount challenge to solve from a number of different points of view, including dependability modeling and evaluation. Key directions to deal with system complexity are abstraction and hierarchical structuring of the system functionalities. This paper addresses the issue of an efficient dependability evaluation by a model-based approach of hierarchical control and resource management systems. We exploited the characteristics of this specific, but important, class of systems and derived a modeling methodology that is not only directed to build models in a compositional way, but it also includes some capabilities to reduce their solution complexity. The modeling methodology and the resolution technique are then applied to a case study consisting of a resource management system developed in the context of the ongoing European project CAUTION++. The results obtained are useful to understand the impact of several system component factors on the dependability of the overall system instance.Source: ISTI Technical reports, 2004

See at: ISTI Repository Open Access | CNR ExploRA


2007 Report Unknown
CRUTIAL - D5 - Dissemination actions and collected publications
Di Giandomenico F., Deconinck G., Donatelli S., Dondossola G., Kaaniche M., Verissimo P.
This deliverable reports the dissemination actions undertaken by the CRUTIAL consortium during the first year as activities performed in workpackage WP6. The document also collects the list of publications produced so far. Given the extremely high interest of different stakeholders involved in critical utilities in the topics addressed by CRUTIAL, and of the wider community from public authorities to European citizens which need to rely on resilient electricity supply system, dissemination is considered a prominent activity of the project. The results achieved during the project will help in designing and assessing resilient electric power and dedicated information infrastructures that will enable to reduce the frequency, duration and extent blackouts, and possible cyber threats by better mastering the various dimensions of interdependencies. This will clearly have a large social and economic impact.Source: Project report, CRUTIAL, Deliverable D5, 2007
Project(s): CRUTIAL

See at: CNR ExploRA


2008 Report Open Access OPEN
Dissemination actions and collected publications
Di Giandomenico F.
This deliverable describes the dissemination actions undertaken by the CRUTIAL consortium in WP6. The document is largely based on the Deliverable D5 on dissemination produced at the end of the first year. It partly reorganizes D5 by separating the dissemination channels from the dissemination actions performed during the first year, and then extends the content by including dissemination actions related to the second year. The document also collects the list of publications produced so far and synthetic plans for exploitation. Given the very high interest of different stakeholders involved in the topics addressed by CRUTIAL, and of the wider community from public authorities to European citizens which need to rely on resilient electricity supply system, dissemination is considered a prominent activity of the project. The results achieved during the project will help in designing and assessing resilient electric power and dedicated information infrastructures that will enable to reduce the frequency, duration and extent of blackouts, and possible cyber threats, by better mastering the various dimensions of interdependencies. This will clearly have a large social and economic impact.Source: Project report, CRUTIAL, Deliverable D12, 2008

See at: ISTI Repository Open Access | CNR ExploRA


2009 Report Open Access OPEN
CRUTIAL D.21 - Dissemination and exploitation
Di Giandomenico F.
This deliverable presents the final results and achievements concerning dissemination and exploitation in CRUTIAL. First, the dissemination actions undertaken by the CRUTIAL consortium in WP6 during the three years duration of the project are extensively described, explicitly listing the publications produced by the project. Identification of exploitable knowledge as results from the CRUTIAL and synthetic plans for their exploitation are then described. The document is largely based on the previous Deliverable D5 and Deliverable D12, on dissemination produced at the end of the first and second year respectively, and extends them by including dissemination and exploitation activities related to the third project period. Given the very high interest of different stakeholders involved in the topics addressed by CRUTIAL, and of the wider community from public authorities to European citizens which need to rely on resilient electricity supply system, dissemination has been considered a prominent activity of the project. The results achieved during the project will help in designing and assessing resilient electric power and dedicated information infrastructures that will enable to reduce the frequency, duration and extent of blackouts, and possible cyber threats, by better mastering the various dimensions of interdependencies. This will clearly have a large social and economic impact.Source: Project report, CRUTIAL, Deliverable D21, 2009

See at: ISTI Repository Open Access | CNR ExploRA


2005 Journal article Closed Access
Hierarchical Radio Resource Management Framework for Integrating WLANs in Cellular Networking Environments
George T. Karetsos, Sofoklis A. Kyriazakos, Evangelos Groustiotis, Felicita Di Giandomenico, Ivan Mura
Over the last few years wireless local area networking (WLAN) has become a very important technology that offers high-speed communication services to mobile users in indoor environments. WLAN technology offers some very attractive characteristics such as high data rates, increased QoS capabilities, and low installation costs which has made many professionals claim that it will be the main opponent of IMT- 2000, despite the enormous effort needed for the specification and implementation of 3G systems. However, WLANs also present many important constraints related mainly to their restricted coverage capabilities. On the other hand, 3G systems are deployed gradually and carefully since their business prospects have not been validated yet and it is expected that 2G and 2G+ cellular systems will continue to play an important role for at least five more years. Thus, today's wireless networking environment is in fact a conglomeration of all these technologies for which there is a strong need for cooperation. In this article we describe a heterogeneous wireless networking environment together with its features and user requirements. We explain the importance of the existence of WLANs and describe a framework and system architecture that support seamless integration of WLAN in heterogeneous cellular networking environments, focusing on support for efficient resource provision and management.Source: IEEE wireless communications 12 (2005): 11–17. doi:10.1109/MWC.2005.1561940
DOI: 10.1109/mwc.2005.1561940
Metrics:


See at: IEEE Wireless Communications Restricted | CNR ExploRA


2012 Contribution to book Restricted
Failure Diagnosis of Complex Systems.
Kavulya S. P., Joshi K., Di Giandomenico F., Narasimhan P.
Failure diagnosis is the process of identifying the causes of impairment in a system's function based on observable symptoms, i.e., determining which fault led to an observed failure. Since multiple faults can often lead to very similar symptoms, failure diagnosis is often the first line of defensewhen things go wrong - a prerequisite before any corrective actions can be undertaken. The results of diagnosis also provide data about a system's operational fault profile for use in offline resilience evaluation. While diagnosis has historically been a largely manual process requiring significant human input, techniques to automate as much of the process as possible have significantly grown in importance in many industries including telecommunications, Internet services, automotive systems, and aerospace. This chapter presents a survey of automated failure diagnosis techniques including both model-based and modelfree approaches. Industrial applications of these techniques in the above domains are presented, and finally, future trends and open challenges in the field are discussed.Source: Resilience Assessment and Evaluation of Computing Systems, edited by Wolter K., Avritzer A., Vieira M., van Moorsel A., pp. 239–261. Berlin: Springer-Verlag, 2012
DOI: 10.1007/978-3-642-29032-9_12
Metrics:


See at: doi.org Restricted | www.springer.com Restricted | CNR ExploRA


2012 Contribution to book Restricted
Assessing dependability and resilience in critical infrastructures: challenges and opportunities
Avritzer A., Di Giandomenico F., Remke A., Riedl M.
Critical infrastructures (CI) are very complex and highly interdependent systems, networks and assets that provide essential services in our daily life. Most CI are either built upon or monitored and controlled by vulnerable information and communication technology (ICT) systems. Critical infrastructures are highly interconnected systems and often use common ICT components and networks. Therefore, cascading faults and failures are likely events in critical infrastructures. Moreover, such failures can easily spread to other infrastructures and can possibly span to other countries or even continents. Assessing resilience is thus a cornerstone for improving the dependability in critical infrastructures. Due to the complexity and interdependency of such systems many different challenges and opportunities surface when developing methods and tools for resilience assessment. During the last decade both academia and industry developed an increased interest in this research area and a variety of projects with different focus started to emerge. This chapter gives an overview about the main requirements for resilience assessment and discusses the state of the art and emerging research directions. To exemplify the diversity of this research area a special focus is put on different sub-fields with increasing granularity from the fairly general interdependency modeling to the reliability modeling of a Smart-Grid distributed automation network.Source: Resilience Assessment and Evaluation of Computing Systems, edited by K. Wolter et al., pp. 41–63. Berlin: Springer-Verlag, 2012
DOI: 10.1007/978-3-642-29032-9_3
Metrics:


See at: NARCIS Restricted | NARCIS Restricted | CNR ExploRA


2014 Conference article Unknown
Security Risk Analysis and Evaluation of Integrating Customer Energy Management Systems into Smart Distribution Grids
Hagerling C., Kurtz F., Wietfeld C., Iacono D., Daidone A., Di Giandomenico F.
The subject addressed by this paper is the analysis and evaluation of different architectural concepts for securely integrating Customer Energy Management Systems into smart distribution grids. Nowadays approaches target the active integration of Distributed Energy Resources, Demand Side Management and Automated Meter Reading into the households in order to enable a manageable and controllable smart distribution grid. Therefore a comprehensive, secure and reliable communication network architecture, reaching down to the customers' premises equipment, needs to be deployed. These networks are usually located at public domains and are connected to the critical infrastructure of the Smart Grid control network. Together with this it represents potential points of failures and possible risks, including malicious attacks and system faults, for the overall system architecture. To reduce the risks associated with connecting the households to the comprehensive monitoring and control architecture, a risk analysis of the multiple communication network architectures is performed. Through this analysis the impact of different access network strategies on security can be assessed to select the most appropriate one, to ensure a reliable operation of the mission-critical Smart Grid communication network infrastructures.Source: 4th CIRED Workshop for Challenges of Implementing Active Distribution System Management, pp. 1–5, Roma, Italy, 11-12 June 2014
Project(s): SMARTC2NET via OpenAIRE

See at: CNR ExploRA


2016 Journal article Open Access OPEN
Achieving functional and non functional interoperability through synthesized connectors
Nostro N., Spalazzese R., Di Giandomenico F., Inverardi P.
Our everyday life is pervaded by the use of a number of heterogeneous systems that are continuously and dynamically available in the networked environment to interoperate to achieve some goal. Goals may include both functional and non functional aspects and the evolving nature of such environment requires automated solutions as means to reach the needed level of flexibility. Achieving interoperability in such environment is a challenging problem. Even though some of such systems may in principle interact since they have compatible functionalities and similar interaction protocols, mismatches in their protocols and non functional issues arising from the environment may undermine their seamless interoperability. In this paper, we propose an approach for the automated synthesis of application layer connectors between heterogeneous networked systems (NSs) addressing both functional and some non functional interoperability. Our contributions are: (i) an automated connectors synthesis approach for NSs interoperability taking into account functional, performance and dependability aspects spanning pre-deployment time and run-time; (ii) a connector adaptation process, related to the performance and dependability aspects; and (iii) a stochastic model-based implementation of the performance and dependability analysis. In addition, we implemented, analyzed, and critically discussed a case study.Source: The Journal of systems and software 111 (2016): 185–199. doi:10.1016/j.jss.2015.09.038
DOI: 10.1016/j.jss.2015.09.038
Metrics:


See at: ISTI Repository Open Access | Journal of Systems and Software Restricted | www.sciencedirect.com Restricted | CNR ExploRA


2019 Contribution to conference Open Access OPEN
Software Engineering for Resilient Systems - 11th International Workshop, SERENE 2019
Calinescu R., Di Giandomenico F.
This volume contains the proceedings of the 11th International Workshop on Software Engineering for Resilient Systems (SERENE 2019). SERENE 2019 took place in Naples, Italy, on September 17, 2019. The SERENE workshop is an annual event that brings together leading researchers and practitioners from academia and industry, to advance the state of the art and to identify open challenges in the software engineering of resilient systems.DOI: 10.1007/978-3-030-30856-8
Metrics:


See at: link.springer.com Open Access | ISTI Repository Open Access | CNR ExploRA


1991 Conference article Unknown
Implementations and extensions of the conversation concept
Di Giandomenico F., Strigini L.
Conversations were proposed as a means of organizing fault tolerance by coordinated backward recovery in a set of communicating processes, avoiding the domino effect and allowing diversity in the retries. The general concept of conversations is susceptible to many different detailed implementations. We review and discuss the problems of implementation and of practical use of conversations, comparing and generalizing the solutions offered in the different existing proposals, and suggesting some useful extensions. We discuss limits to the complexity of implementations that can be exploited in practice, and to the applications that can be programmed using the conversation scheme.Source: 5th International Conference on Fault-Tolerant Computing Systems, Tests, Diagnosis, Fault treatment, pp. 42–53, Nurnberg, Germania, September 25-27 1991

See at: CNR ExploRA