Virtualizing mixed-criticality systems: A survey on industrial trends and issues
Virtualization is gaining attraction in the industry as it promises a flexible way to integrate,
manage, and re-use heterogeneous software components with mixed-criticality levels, on a …
manage, and re-use heterogeneous software components with mixed-criticality levels, on a …
[HTML][HTML] Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform
Cloud computing systems fail in complex and unforeseen ways due to unexpected
combinations of events and interactions among hardware and software components. These …
combinations of events and interactions among hardware and software components. These …
Automated patching for unreproducible builds
Software reproducibility plays an essential role in establishing trust between source code
and the built artifacts, by comparing compilation outputs acquired from independent users …
and the built artifacts, by comparing compilation outputs acquired from independent users …
An investigation of cyber-attacks and security mechanisms for connected and autonomous vehicles
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …
transportation on a global scale. Such innovations for transportation can bring manyfold …
Fault injection to generate failure data for failure prediction: A case study
Due to the complexity of modern software, identifying every fault before deployment is
extremely difficult or even not possible. Such residual faults can ultimately lead to failures …
extremely difficult or even not possible. Such residual faults can ultimately lead to failures …
[PDF][PDF] Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems.
• For reproducibility and stability purposes of using DL systems, it is expected that DL
systems can have a deterministic behavior in identical training runs: under a fixed software …
systems can have a deterministic behavior in identical training runs: under a fixed software …
A Survey of Security Mechanisms for Edge Computing based Connected Autonomous Vehicles
Connected and autonomous vehicles (CAVs) can fulfill the emerging demand for smart
transportation on a global scale. Such innovations for transportation can bring manyfold …
transportation on a global scale. Such innovations for transportation can bring manyfold …
Performability assessment of containerized multi-tenant IMS through multidimensional UGF
We advance a performability assessment of a multi-tenant containerized IP Multimedia
Subsystem (cIMS), ie: one and the same infrastructure is shared among different providers …
Subsystem (cIMS), ie: one and the same infrastructure is shared among different providers …
Certify the uncertified: Towards assessment of virtualization for mixed-criticality in the automotive domain
M Cinque, L De Simone… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
Nowadays, a feature-rich automotive vehicle offers several technologies to assist the driver
during his trip and guarantee an amusing infotainment system to the other passengers, too …
during his trip and guarantee an amusing infotainment system to the other passengers, too …
A next-generation platform for Cyber Range-as-a-Service
V Orbinato - 2021 IEEE International Symposium on Software …, 2021 - ieeexplore.ieee.org
In the last years, Cyber Ranges have become a widespread solution to train professionals
for responding to cyber-threats and attacks. Cloud computing plays a key role in this context …
for responding to cyber-threats and attacks. Cloud computing plays a key role in this context …