Search For:

Displaying 1-50 out of 54 total
The PreCertification Kit for Operating Systems in Safety Domains
Found in: Software Certification, International Workshop on
By Domenico Cotroneo,Domenico Di Leo,Nuno Silva,Ricardo Barbosa
Issue Date:December 2011
pp. 19-24
In present-day, software is taking over functionalities traditionally implemented in hardware, therefore the software architecture has been more complex and large. In such software architecture is common to be present an Operating System (OS). However, in ...
 
Adaptive monitoring in microkernel OSs
Found in: Dependable Systems and Networks Workshops
By Domenico Cotroneo, Domenico Di Leo, Roberto Natella
Issue Date:July 2010
pp. 66-72
The microkernel architecture has been investigated by both industries and the academia for the development of dependable Operating Systems (OSs). This work copes with a relevant issue for this architecture, namely unresponsive components because of deadloc...
 
Automated Generation of Performance and Dependability Models for the Assessment of Wireless Sensor Networks
Found in: IEEE Transactions on Computers
By Marcello Cinque,Domenico Cotroneo,Catello Di Martino
Issue Date:June 2012
pp. 870-884
Wireless Sensor Networks (WSNs) are widely recognized as a promising solution to build next-generation monitoring systems. Their industrial uptake is however still compromised by the low level of trust on their performance and dependability. Whereas analyt...
 
The Hide and Seek Field Data Game
Found in: European Dependable Computing Conference
By Domenico Cotroneo
Issue Date:October 2006
pp. 66-68
Since around 80?s, researchers and software engineers dealing with dependability of system and software products have recognized the crucial role of field data. Field data represent an attractive way for increasing the efficiency of testing activities and,...
 
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Marcello Cinque,Domenico Cotroneo,Raffaele Della Corte,Antonio Pecchia
Issue Date:June 2014
pp. 690-695
Event logs are the first place where to find useful information about application failures. Event logs are available at different system levels, such as application, middleware and operating system. In this paper we analyze the failure reporting capability...
 
Cost-Benefit Analysis of Virtualizing Batch Systems: Performance-Energy-Dependability Trade-Offs
Found in: 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing (UCC)
By Marcello Cinque,Domenico Cotroneo,Flavio Frattini,Stefano Russo
Issue Date:December 2013
pp. 264-268
Performance, energy efficiency, and dependability are key characteristics of batch systems, which can be differently affected when adopting virtualization. Scientific literature usually analyzes the variation with respect to different configurations of one...
 
Fault Injection for Software Certification
Found in: IEEE Security & Privacy
By Domenico Cotroneo,Roberto Natella
Issue Date:July 2013
pp. 38-45
As software becomes more pervasive and complex, it's increasingly important to ensure that a system will be safe even in the presence of residual software faults (or bugs). Software fault injection consists of the deliberate introduction of software faults...
 
Towards secure monitoring and control systems: Diversify!
Found in: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Domenico Cotroneo,Antonio Pecchia,Stefano Russo
Issue Date:June 2013
pp. 1-2
Cyber attacks have become surprisingly sophisticated over the past fifteen years. While early infections mostly targeted individual machines, recent threats leverage the widespread network connectivity to develop complex and highly coordinated attacks invo...
 
Analysis and Prediction of Mandelbugs in an Industrial Software System
Found in: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation (ICST)
By Gabriella Carrozza,Domenico Cotroneo,Roberto Natella,Roberto Pietrantuono,Stefano Russo
Issue Date:March 2013
pp. 262-271
Mandelbugs are faults that are triggered by complex conditions, such as interaction with hardware and other software, and timing or ordering of events. These faults are considerably difficult to detect with traditional testing techniques, since it can be c...
 
On Fault Representativeness of Software Fault Injection
Found in: IEEE Transactions on Software Engineering
By Roberto Natella,Domenico Cotroneo,Joao A. Duraes,Henrique S. Madeira
Issue Date:January 2013
pp. 80-96
The injection of software faults in software components to assess the impact of these faults on other components or on the system as a whole, allowing the evaluation of fault tolerance, is relatively new compared to decades of research on hardware fault in...
 
Assessing time coalescence techniques for the analysis of supercomputer logs
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Catello Di Martino,Marcello Cinque,Domenico Cotroneo
Issue Date:June 2012
pp. 1-12
This paper presents a novel approach to assess time coalescence techniques. These techniques are widely used to reconstruct the failure process of a system and to estimate dependability measurements from its event logs. The approach is based on the use of ...
   
Experimental Analysis of Binary-Level Software Fault Injection in Complex Software
Found in: European Dependable Computing Conference
By Domenico Cotroneo,Anna Lanzaro,Roberto Natella,Ricardo Barbosa
Issue Date:May 2012
pp. 162-172
The injection of software faults (i.e., bugs) by mutating the binary executable code of a program enables the experimental dependability evaluation of systems for which the source code is not available. This approach requires that programming constructs us...
 
Software Aging and Rejuvenation: Where We Are and Where We Are Going
Found in: Workshop on Software Aging and Rejuvenation
By Domenico Cotroneo,Roberto Natella,Roberto Pietrantuono,Stefano Russo
Issue Date:December 2011
pp. 1-6
After 16 years, a significant body of knowledge has been established in the area of Software Aging and Rejuvenation (SAR). In this paper, we survey papers about SAR that appeared in IEEE conferences and journals, identify where SAR research has been mostly...
 
Workload Characterization for Software Aging Analysis
Found in: Software Reliability Engineering, International Symposium on
By Antonio Bovenzi,Domenico Cotroneo,Roberto Pietrantuono,Stefano Russo
Issue Date:December 2011
pp. 240-249
The phenomenon of software aging is increasingly recognized as a relevant problem of long-running systems. Numerous experiments have been carried out in the last decade to empirically analyze software aging. Such experiments, besides highlighting the relev...
 
Investigation on Safety-Related Standards for Critical Systems
Found in: Software Certification, International Workshop on
By Christian Esposito,Domenico Cotroneo,Nuno SIlva
Issue Date:December 2011
pp. 49-54
In each application domain for safety-critical systems, international organizations have issued regulations concerned with the development, implementation, validation and maintenance of safety-critical systems. In particular, each of them indicate a defini...
 
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach
Found in: Reliable Distributed Systems, IEEE Symposium on
By Antonio Pecchia,Aashish Sharma,Zbigniew Kalbarczyk,Domenico Cotroneo,Ravishankar K. Iyer
Issue Date:October 2011
pp. 127-136
The growing demand for processing and storage capabilities has led to the deployment of high-performance computing infrastructures. Users log into the computing infrastructure remotely, by providing their credentials (e.g., username and password), through ...
 
Improving Log-based Field Failure Data Analysis of multi-node computing systems
Found in: Dependable Systems and Networks, International Conference on
By Antonio Pecchia,Domenico Cotroneo,Zbigniew Kalbarczyk,Ravishankar K. Iyer
Issue Date:June 2011
pp. 97-108
Log-based Field Failure Data Analysis (FFDA) is a widely-adopted methodology to assess dependability properties of an operational system. A key step in FFDA is filtering out entries that are not useful and redundant error entries from the log. The latter i...
 
5th international workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011
Found in: Dependable Systems and Networks, International Conference on
By Domenico Cotroneo,Vincenzo De Florio
Issue Date:June 2011
pp. 597-598
The vision of mobile and ubiquitous systems is becoming a reality thanks to the recent advances in wireless communication and device miniaturization. However, the widespread industrial uptake of these systems is still compromised by the highly error-prone ...
 
5th International workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011
Found in: Dependable Systems and Networks Workshops
By Domenico Cotroneo,Vincenzo De Florio
Issue Date:June 2011
pp. 278-279
The vision of mobile and ubiquitous systems is becoming a reality thanks to the recent advances in wireless communication and device miniaturization. However, the widespread industrial uptake of these systems is still compromised by the highly error-prone ...
 
Architecture-Based Criticality Assessment of Software Systems
Found in: Dependable Computing, Latin-American Symposium on
By Domenico Cotroneo, Antonio Pecchia, Roberto Pietrantuono, Stefano Russo
Issue Date:April 2011
pp. 126-135
The development of dependable software systems with acceptable costs and time often requires architectural analyses and criticality assessment strategies to achieve a detailed understanding of the system failing behavior. This information is valuable to ev...
 
Qualification and Selection of Off-the-Shelf Components for Safety Critical Systems: A Systematic Approach
Found in: Dependable Computing Workshops, Latin-American Symposium on
By Christian Esposito, Domenico Cotroneo, Ricardo Barbosa, Nuno Silva
Issue Date:April 2011
pp. 52-57
Mission critical systems are increasingly been developed by means of Off-The-Shelf (OTS) items since this allows reducing development costs. Crucial issues to be properly treated are (i) to assess the quality of each potential OTSitem to be used and (ii) t...
 
Software Aging Analysis of the Linux Operating System
Found in: Software Reliability Engineering, International Symposium on
By Domenico Cotroneo, Roberto Natella, Roberto Pietrantuono, Stefano Russo
Issue Date:November 2010
pp. 71-80
Software systems running continuously for a long time tend to show degrading performance and an increasing failure occurrence rate, due to error conditions that accrue over time and eventually lead the system to failure. This phenomenon is usually referred...
 
Effective Data Dissemination for Large-Scale Complex Critical Infrastructures
Found in: Dependability, International Conference on
By Christian Esposito, Catello Di Martino, Marcello Cinque, Domenico Cotroneo
Issue Date:July 2010
pp. 64-69
Large-scale complex infrastructures are emerging as new computing platforms for the federation of world-wide mission critical systems over the Internet. However, standard approaches to data dissemination are still not adequate to the scale of these systems...
 
Field Data Based Modeling of Sender Based Message Logging Protocols for Supercomputers Checkpointing
Found in: Distributed Computing Systems Workshops, International Conference on
By Domenico Cotroneo, Catello Di Martino
Issue Date:June 2010
pp. 294-301
Checkpointing is today’s common mean for dealing with transient failures in supercomputers. However, the effectiveness of checkpointing and recovery protocols under the assumption that failures may happen during their operation is not well understood. We p...
 
Assessing and improving the effectiveness of logs for the analysis of software faults
Found in: Dependable Systems and Networks, International Conference on
By Marcello Cinque, Domenico Cotroneo, Roberto Natella, Antonio Pecchia
Issue Date:July 2010
pp. 457-466
Event logs are the primary source of data to characterize the dependability behavior of a computing system during the operational phase. However, they are inadequate to provide evidence of software faults, which are nowadays among the main causes of system...
 
Representativeness analysis of injected software faults in complex software
Found in: Dependable Systems and Networks, International Conference on
By Roberto Natella, Domenico Cotroneo, Joao Duraes, Henrique Madeira
Issue Date:July 2010
pp. 437-446
Despite of the existence of several techniques for emulating software faults, there are still open issues regarding representativeness of the faults being injected. An important aspect, not considered by existing techniques, is the non-trivial activation c...
 
An effective approach for injecting faults in wireless sensor network operating systems
Found in: Computers and Communications, IEEE Symposium on
By Marcello Cinque, Domenico Cotroneo, Catello Di Martino, Alessandro Testa
Issue Date:June 2010
pp. 567-569
This paper presents an effective approach for injecting faults/errors in WSN nodes operating systems. The approach is based on the injection of faults at the assembly level. Results show that depending on the concurrency model and on the memory management,...
 
Reliable Event Dissemination over Wide-Area Networks without Severe Performance Fluctuations
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Christian Esposito, Domenico Cotroneo, Stefano Russo
Issue Date:May 2010
pp. 97-101
Publish/subscribe middleware is being increasingly used to devise large-scale critical systems. Although several reliable publish/subscribe solutions have been proposed, none of them properly address the problem of assuring message dissemination even if ne...
 
Emulation of Transient Software Faults for Dependability Assessment: A Case Study
Found in: European Dependable Computing Conference
By Roberto Natella, Domenico Cotroneo
Issue Date:April 2010
pp. 23-32
Fault Tolerance Mechanisms (FTMs) are extensively used in software systems to counteract software faults, in particular against faults that manifest transiently, namely Mandelbugs. In this scenario, Software Fault Injection (SFI) plays a key role for the v...
 
Calibrating RSS-Based Indoor Positioning Systems
Found in: Wireless and Mobile Computing, Networking and Communication, IEEE International Conference on
By Christian Esposito, Domenico Cotroneo, Massimo Ficco
Issue Date:October 2009
pp. 1-6
Location estimation based on Received Signal Strength (RSS) is the prevalent method in indoor positioning. For RSS-based methods a massive collection of training RSS samples is needed to calibrate the positioning system and to achieve a high positioning qu...
 
Assessment and Improvement of Hang Detection in the Linux Operating System
Found in: Reliable Distributed Systems, IEEE Symposium on
By Domenico Cotroneo, Roberto Natella, Stefano Russo
Issue Date:September 2009
pp. 288-294
We propose a fault injection framework to assess hang detection facilities within the Linux Operating System (OS). The novelty of the framework consists in the adoption of a more representative faultload than existing ones, and in the effectiveness in term...
 
AVR-INJECT: A tool for injecting faults in Wireless Sensor Nodes
Found in: Parallel and Distributed Processing Symposium, International
By Marcello Cinque,Domenico Cotroneo,Catello Di Martino,Stefano Russo,Alessandro Testa
Issue Date:May 2009
pp. 1-8
As the incidence of faults in real Wireless Sensor Networks (WSNs) increases, fault injection is starting to be adopted to verify and validate their design choices. Following this recent trend, this paper presents a tool, named AVR-INJECT, designed to auto...
 
Dependability Evaluation and Modeling of the Bluetooth Data Communication Channel
Found in: Parallel, Distributed, and Network-Based Processing, Euromicro Conference on
By Gabriella Carrozza, Marcello Cinque, Domenico Cotroneo, Stefano Russo
Issue Date:February 2008
pp. 245-252
This work presents a measurement-based dependability evaluation of the Bluetooth data communication channel, i.e., the Baseband layer. The main contribution is the definition of the Baseband?s error/recovery model according to the Markov chains formalism. ...
 
Modeling and Assessing the Dependability ofWireless Sensor Networks
Found in: Reliable Distributed Systems, IEEE Symposium on
By Marcello Cinque, Domenico Cotroneo, Catello Di Martinio, Stefano Russo
Issue Date:October 2007
pp. 33-44
This paper proposes a flexible framework for dependability modeling and assessing of Wireless Sensor Networks (WSNs). The framework takes into account network related aspects (topology, routing, network traffic) as well as hardware/software characteristics...
 
Characterizing Aging Phenomena of the Java Virtual Machine
Found in: Reliable Distributed Systems, IEEE Symposium on
By Domenico Cotroneo, Salvatore Orlando, Stefano Russo
Issue Date:October 2007
pp. 127-136
In this work we investigate software aging phenom- ena inside the Java Virtual Machine (JVM). Starting from an experimental campaign on real world testbeds, this work isolates the contribution of the JVM to the overall aging trend, and identifies, through ...
 
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones
Found in: Dependable Systems and Networks, International Conference on
By Marcello Cinque, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer
Issue Date:June 2007
pp. 585-594
While the new generation of hand-held devices, e.g., smart phones, support a rich set of applications, growing complexity of the hardware and runtime environment makes the devices susceptible to accidental errors and malicious attacks. Despite these concer...
 
UbiComp 2006 Workshops, Part 1
Found in: IEEE Pervasive Computing
By John Krumm, Ken Anderson, Anxo Cereijo Roibás, Petter Bae Brandtzaeg, Veerle Van Rompaey, Urpo Tuomela, Anthony Burke, Eric Paulos, Amanda Williams, Seiie Jang, Kenji Mase, Kristof van Laerhoven, Sang-Goog Lee, Domenico Cotroneo, Cristiano di Flora
Issue Date:January 2007
pp. 92-94
This article presents summaries of four of the UbiComp 2006 Workshops: Interactive Media Systems for Seniors, Exurban Noir, Personalized Context Modeling and Management for UbiComp Applications, and System Support for Future Mobile Computing Applications. ...
 
Failure classification and analysis of the Java Virtual Machine
Found in: Distributed Computing Systems, International Conference on
By Domenico Cotroneo, Salvatore Orlando, Stefano Russo
Issue Date:July 2006
pp. 17
<p>This paper presents a failure analysis of the Java Virtual Machine providing useful insights into the nature of reported failures and to improve the understanding of its dependability aspects. Failure data is extracted from publicly available bug ...
 
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks
Found in: Dependable Systems and Networks, International Conference on
By Marcello Cinque, Domenico Cotroneo, Stefano Russo
Issue Date:June 2006
pp. 313-322
This work presents a failure data analysis campaign on Bluetooth Personal Area Networks (PANs) conducted on two kind of heterogeneous testbeds (working for more than one year). The obtained results reveal how failures distribution are characterized and sug...
 
Automated Logging of Mobile Phones Failures Data
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Paolo Ascione, Marcello Cinque, Domenico Cotroneo
Issue Date:April 2006
pp. 520-530
The increasing complexity of mobile phones directly affects their reliability, while the user tolerance for failures becomes to decrease, especially when the phone is used for business- or missioncritical applications. Despite these concerns, there is stil...
 
An Automated Distributed Infrastructure for Collecting Bluetooth Field Failure Data
Found in: Object-Oriented Real-Time Distributed Computing, IEEE International Symposium on
By Marcello Cinque, Fabio Cornevilli, Domenico Cotroneo, Stefano Russo
Issue Date:May 2005
pp. 329-336
The widespread use of mobile and wireless computing platforms is leading to a growing interest on dependability issues. Several research studies have been conducted on dependability of mobile environments, but none of them attempted to identify system bott...
 
Reliable Monitoring of Network-related Performance Parameters inWireless Environments
Found in: Object-Oriented Real-Time Dependable Systems, IEEE International Workshop on
By Domenico Cotroneo, Armando Migliaccio, Stefano Russo
Issue Date:February 2005
pp. 271-278
<p>End-to-end delay estimation is a crucial issue in the design of network monitoring systems for wireless best-effort infrastructures. This work demonstrates that estimations based on one-way delay are the most suitable for evaluating the delay on w...
 
Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications
Found in: IEEE Transactions on Dependable and Secure Computing
By Andrea Bondavalli, Silvano Chiaradonna, Domenico Cotroneo, Luigi Romano
Issue Date:October 2004
pp. 223-237
This paper proposes a novel methodology and an architectural framework for handling multiple classes of faults (namely, hardware-induced software errors in the application, process and/or host crashes or hangs, and errors in the persistent system stable st...
 
Implementing Positioning Services over an Ubiquitous Infrastructure
Found in: Software Technologies for Future Embedded and Ubiquitous Systems, IEEE Workshop on
By Domenico Cotroneo, Stefano Russo, Fabio Cornevilli, Massimo Ficco, Vincenzo Vecchio
Issue Date:May 2004
pp. 14
Ubiquitous computing is rapidly emerging as a framework for deploying mobile and context-aware applications. This paper focuses on a new approach, and the resulting architecture, for implementing positioning services over ubiquitous infrastructures. Our dr...
 
Integrating Mobile Agent Infrastructures with CORBA-based Distributed Multimedia Applications
Found in: Parallel, Distributed, and Network-Based Processing, Euromicro Conference on
By Paolo Bellavista, Antonio Corradi, Domenico Cotroneo, Stefano Russo
Issue Date:February 2001
pp. 121
The increased computing power and the enhanced connectivity of current open computing systems are encouraging the deployment of new classes of services both centered around dynamically changing user requirements and based on the exploitation of the Interne...
 
Fault triggers in open-source software: An experience report
Found in: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)
By Domenico Cotroneo,Michael Grottke,Roberto Natella,Roberto Pietrantuono,Kishor S. Trivedi
Issue Date:November 2013
pp. 178-187
With software systems becoming increasingly large and complex, many difficulties in coping with software bugs arise for developers. Despite good development practices, thorough testing, and proper maintenance policies, a non-negligible number of bugs remai...
   
Event Logs for the Analysis of Software Failures: A Rule-Based Approach
Found in: IEEE Transactions on Software Engineering
By Marcello Cinque,Domenico Cotroneo,Antonio Pecchia
Issue Date:June 2013
pp. 806-821
Event logs have been widely used over the last three decades to analyze the failure behavior of a variety of systems. Nevertheless, the implementation of the logging mechanism lacks a systematic approach and collected logs are often inaccurate at reporting...
 
An Integrated Approach to Design Complex CORBA Systems
Found in: Software Methods and Tools
By Domenico Cotroneo, Stefano Russo, Carlo Savy
Issue Date:November 2000
pp. 167
This paper presents an approach for designing complex distributed systems based on CORBA. The approach stems from the integration of an object-oriented (00) development process, the GRASP patterns, and the environmental object model. GRASP is a structured ...
 
A survey of software aging and rejuvenation studies
Found in: ACM Journal on Emerging Technologies in Computing Systems (JETC)
By Domenico Cotroneo, Roberto Natella, Roberto Pietrantuono, Stefano Russo
Issue Date:January 2014
pp. 1-34
Software aging is a phenomenon plaguing many long-running complex software systems, which exhibit performance degradation or an increasing failure rate. Several strategies based on the proactive rejuvenation of the software state have been proposed to coun...
     
Error detection framework for complex software systems
Found in: Proceedings of the 13th European Workshop on Dependable Computing (EWDC '11)
By Antonio Bovenzi, Domenico Cotroneo, Gabriella Carrozza, Roberto Pietrantuono
Issue Date:May 2011
pp. 61-66
Software systems employed in critical scenarios are increasingly large and complex. The usage of many heterogeneous components causes complex interdependences, and introduces sources of non-determinism, that often lead to the activation of subtle faults. S...
     
 1  2 Next >>