You searched for subject:(Software Diversity)
.
Showing records 1 – 21 of
21 total matches.
No search limiters apply to these results.

Penn State University
1.
Huang, Chu.
Towards Effective Techniques For Cyber Maneuver Defenses.
Degree: 2015, Penn State University
URL: https://submit-etda.libraries.psu.edu/catalog/27400
► Due to the lowered cost and ease of integration, in the past decades, the commercial software market has been dominated by a small number of…
(more)
▼ Due to the lowered cost and ease of integration, in the past decades, the commercial
software market has been dominated by a small number of large vendors. Popular
software, such as Microsoft Windows, Office, Linux, Mozilla Firefox, and Adobe Reader, etc, has been installed on hundreds of millions of computers worldwide. Such dominance in today's information technology environments has created a monoculture that may lead to significant security problems, due to the existence of the large proportion of common vulnerabilities.
Among many proposed methods in the recent years,
software diversity is a well-accepted and commonly used technique against monoculture threats. In this dissertation we present three topology-aware
software assignment methods, which algorithmically distribute
software to networked systems to increase the
diversity at avoiding large scale propagation of worms or duplicated attacks. Following the survivability through heterogeneity philosophy, we present our first study to improve the survivability of networked systems based on graph multi-coloring. Specifically, we design an efficient algorithm to select and deploy a set of off-the-shelf
software to hosts in a networked system, such that the number and types of vulnerabilities presented on one host would be different from that on its neighboring nodes. In this way, we are able to contain a worm in an isolated "island". Naturally, we extend our first study one step further by taking the vulnerability severity into consideration. So in our second study we further redefine the goal of the
software assignment problem as reducing the overall potential damage caused by various attack, rather than the number of infected computers. Based on this research goal, we introduced an improved
software assignment method by measuring the potential damage resulting by exploiting potential vulnerabilities. We also propose possible improvement on the algorithm by considering the topology of the networks, such as the in-degree, and betweenness, etc. Our evaluation on those improvements can be used as guidance for defender's adjustment according to their architecture in real-world. Extended from our second study, we transform the
software assignment problem from single objective to multiple objectives, which incorporates several real-world criteria simultaneously, including network survivability, system feasibility and usability. To solve this multi-objective problem efficiently, we propose an ant colony optimization (ACO) based algorithm, where colonies of artificial ants work collaboratively through both heuristic information and pheromone-mediated communication to iteratively search for better solutions. To validate the generalizability of the proposed method, we experiment our algorithm on various types of network topologies with different parameter settings. The results show that our model can be applied as an effective method for assigning
software for multiple objectives. Finally, we propose an evaluation framework for assessing and comparing various
software…
Advisors/Committee Members: Sencun Zhu, Dissertation Advisor/Co-Advisor, Sencun Zhu, Committee Chair/Co-Chair, Dinghao Wu, Committee Member, Anna Cinzia Squicciarini, Committee Member, Zhen Lei, Committee Member.
Subjects/Keywords: moving target defense; software diversity
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Huang, C. (2015). Towards Effective Techniques For Cyber Maneuver Defenses. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/27400
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Huang, Chu. “Towards Effective Techniques For Cyber Maneuver Defenses.” 2015. Thesis, Penn State University. Accessed March 01, 2021.
https://submit-etda.libraries.psu.edu/catalog/27400.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Huang, Chu. “Towards Effective Techniques For Cyber Maneuver Defenses.” 2015. Web. 01 Mar 2021.
Vancouver:
Huang C. Towards Effective Techniques For Cyber Maneuver Defenses. [Internet] [Thesis]. Penn State University; 2015. [cited 2021 Mar 01].
Available from: https://submit-etda.libraries.psu.edu/catalog/27400.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Huang C. Towards Effective Techniques For Cyber Maneuver Defenses. [Thesis]. Penn State University; 2015. Available from: https://submit-etda.libraries.psu.edu/catalog/27400
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Penn State University
2.
Zhao, Mingyi.
Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration.
Degree: 2016, Penn State University
URL: https://submit-etda.libraries.psu.edu/catalog/13391muz127
► In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions,…
(more)
▼ In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because
software code that supports this digital world has security vulnerabilities. These vulnerabilities are the root causes of many security incidents, ranging from massive user information leakages, to the damage of industrial control systems.
Security professionals have been working hard to eliminate
software vulnerabilities with mainly two approaches. The first approach is to protect
software programs from unknown attacks at production run-time. The second approach is to continuously review and test a
software product even after release, in order to find and fix vulnerabilities before attackers can exploit them. However, both approaches are limited by the capability and resource available to an individual program instance or a single organization.
This dissertation proposes and evaluates novel approaches for discovering and mitigating
software vulnerabilities based on large-scale collaborations, which overcome the limitations of an individual party. We first look at how
software program instances can autonomously collaborate with each other to defend against zero-day attacks. We propose a new security defense called collaborative run-time protection, which distributes the high overhead of security monitoring to a set of
software instances, and coordinates the instances so that together they can cover the potential vulnerability space. Once an instance detects a zero-day vulnerability, it quickly shares a codeless patch with other instances so that the whole group becomes immune to the threat. We implement a prototype system called HeapCRP, which protects C/C++ programs from heap memory bugs. Our evaluation shows that HeapCRP is effective against real world vulnerabilities, with low cost.
We next explore the rapidly growing vulnerability discovery ecosystem emerging from the collaboration between organizations and the global white hat hacker community. Our study shows that this collaboration has yielded tens of thousands of vulnerabilities being discovered and fixed in the past several years, for a wide range of organizations, including many famous Internet companies, financial institutions, and even government agencies. We further provide evidence showing that white hats' scrutiny makes finding new vulnerabilities increasingly difficult, indicating improved security for these organizations. However, we also identified several frictions that raise the cost and risk of such collaboration. Therefore, we further propose new models and policies to scale the promise of this collaboration to a larger number of organizations and white hats. We first propose a new hacker allocation mechanism to reduce the number of duplicated reports. Next, we evaluate existing bug bounty policies that aim to control the quality of submission from hackers, and propose a new policy…
Advisors/Committee Members: Peng Liu, Dissertation Advisor/Co-Advisor, Peng Liu, Committee Chair/Co-Chair, Jens Grossklags, Committee Member, Xinyu Xing, Committee Member, Minghui Zhu, Outside Member.
Subjects/Keywords: software vulnerability; bug bounty; memory corruption; software diversity; crowdsourcing
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zhao, M. (2016). Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/13391muz127
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Zhao, Mingyi. “Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration.” 2016. Thesis, Penn State University. Accessed March 01, 2021.
https://submit-etda.libraries.psu.edu/catalog/13391muz127.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Zhao, Mingyi. “Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration.” 2016. Web. 01 Mar 2021.
Vancouver:
Zhao M. Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration. [Internet] [Thesis]. Penn State University; 2016. [cited 2021 Mar 01].
Available from: https://submit-etda.libraries.psu.edu/catalog/13391muz127.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Zhao M. Discovering and Mitigating Software Vulnerabilities Through Large-scale Collaboration. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/13391muz127
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Waterloo
3.
Nadri, Reza.
On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub.
Degree: 2020, University of Waterloo
URL: http://hdl.handle.net/10012/16191
► Context: Open Source Software (OSS) projects are typically the result of collective efforts performed by developers with different backgrounds. Although the quality of developers' contributions…
(more)
▼ Context: Open Source Software (OSS) projects are typically the result of collective efforts performed by developers with different backgrounds. Although the quality of developers' contributions should be the only factor influencing the evaluation of the contributions to OSS projects, recent studies have shown that diversity issues affect the acceptance or rejection of their contributions. Objective: This thesis assists this emerging state-of-the-art body on diversity research with the first empirical study that analyzes how perceptible ethnicity relates to the evaluation outcome of the contributions in GitHub. Methodology: We performed a large-scale quantitative analysis of the relationship between developers' perceptible ethnicity and the evaluation of their contributions. We extracted the perceptible ethnicity of developers from their names in GitHub using the tool, Name-Prism, and applied regression modelling of pull request data from GHTorrent and GitHub. Results: We observe that (1) among the developers whose perceptible ethnicity was captured by the tool, only 16.56% of contributors were perceptible as Non-White; (2) contributions from developers perceived as White have the highest acceptance rate; (3) being perceptible as White have a positive, and being perceptible as Asian, Pacific Islander, Hispanic, or Black might \fix{have} a negative influence on the evaluation of the contributions. Conclusion: While we did not observe any conscious bias against any group, our initial analysis leads us to believe that there may exist an unconscious bias against developers with ethnicity perceptible as Non-White. Thus, our findings reinforce the need for further studies on ethnic diversity in software engineering to foster a healthier OSS community.
Subjects/Keywords: perceptible ethnicity diversity; Software Development; Open Source Software
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nadri, R. (2020). On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/16191
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Nadri, Reza. “On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub.” 2020. Thesis, University of Waterloo. Accessed March 01, 2021.
http://hdl.handle.net/10012/16191.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Nadri, Reza. “On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub.” 2020. Web. 01 Mar 2021.
Vancouver:
Nadri R. On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub. [Internet] [Thesis]. University of Waterloo; 2020. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10012/16191.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Nadri R. On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub. [Thesis]. University of Waterloo; 2020. Available from: http://hdl.handle.net/10012/16191
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of California – Irvine
4.
Crane, Stephen.
Enhancing and Extending Software Diversity.
Degree: Computer Science, 2015, University of California – Irvine
URL: http://www.escholarship.org/uc/item/45w3n70k
► Software immunity through diversity is a promising research direction. Address Space Layout Randomization has been widely deployed to defend against code-reuse attacks and significantly raises…
(more)
▼ Software immunity through diversity is a promising research direction. Address Space Layout Randomization has been widely deployed to defend against code-reuse attacks and significantly raises the bar for attackers. However, automated software diversity is still exploitable by adroit and adaptable adversaries. Using powerful memory disclosure attacks, offensive researchers have demonstrated weaknesses in conventional randomization techniques. In addition, current defenses are largely passive and allow attackers to continuously brute-force randomized defenses with little impediment. Building on the foundation of automated software diversity, we propose novel techniques to strengthen the security and broaden the impact of code randomization. We first discuss software booby traps, a new active defense technique enabled by randomized program contents. We then propose, implement, and evaluate a comprehensive randomization-based system, Readactor++, which is resilient to all types of memory disclosure attacks. Readactor++ enforces execute-only memory protections on commodity x86 processors, thus preventing direct disclosure of randomized code. We also identify the indirect disclosure attack, a new class of code leakage via data disclosure, and mitigate this attack as well. By integrating booby traps into our system, we protect against brute-force memory disclosure attempts. In our evaluation we find that Readactor++ compares favorably to other memory-disclosure resilient code-reuse defenses and that it scales effectively to complex, real-world software. Finally, we propose a novel extension of code randomization to mitigate side-channel rather than code-reuse attacks. Using control-flow diversity, a novel control-flow transformation, we introduce dynamic behavior into program side effects with fast, static code. As an example, we apply this technique to mitigate an AES cache side-channel attack. With our techniques, software diversity can now be efficiently secured against advanced attacks, including memory disclosure and function table reuse, and is adaptable to combat new classes of threats, such as side-channel attacks.
Subjects/Keywords: Computer science; Code-reuse Attacks; Computer Security; Side-channel Attacks; Software Defenses; Software Diversity
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Crane, S. (2015). Enhancing and Extending Software Diversity. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/45w3n70k
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Crane, Stephen. “Enhancing and Extending Software Diversity.” 2015. Thesis, University of California – Irvine. Accessed March 01, 2021.
http://www.escholarship.org/uc/item/45w3n70k.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Crane, Stephen. “Enhancing and Extending Software Diversity.” 2015. Web. 01 Mar 2021.
Vancouver:
Crane S. Enhancing and Extending Software Diversity. [Internet] [Thesis]. University of California – Irvine; 2015. [cited 2021 Mar 01].
Available from: http://www.escholarship.org/uc/item/45w3n70k.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Crane S. Enhancing and Extending Software Diversity. [Thesis]. University of California – Irvine; 2015. Available from: http://www.escholarship.org/uc/item/45w3n70k
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Jönköping University
5.
Karimi, Sameer.
Diversity management and innovation in Swedish tech companies : An exploratory study about the understanding of diversity management.
Degree: 2019, Jönköping University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-47099
► Background: Diversity as a topic is interesting as the world is becoming more globalized and the opportunities related to having a diverse workforce are…
(more)
▼ Background: Diversity as a topic is interesting as the world is becoming more globalized and the opportunities related to having a diverse workforce are compelling. Much research has been made on diversity management and its impact on companies, but in contrast there is limited research in the Swedish tech industry. Purpose: The purpose of this thesis is to study the understanding of diversity management within Swedish tech companies and if this could be related to innovation. We apply this research of diversity by looking at it from the context of ethnicity, gender, age and culture. Method: For this thesis we use a qualitative research strategy as we wish to gain in-depth knowledge from managers within Swedish tech companies. Using an exploratory research design, this study sheds light to the current state of diversity within tech companies in Sweden. Through semi structured interviews with seven managers from five tech companies in Sweden, we gain insights from the organizational level of how diversity management is understood and if there is a link to innovation. Using a grounded analysis to interpret the collected primary data, we have identified emerging themes that we use to draw conclusions. Findings: We have identified four emerging themes surrounding the empirical data collected. These are; (1) The understanding of diversity and innovation, (2) Managers point of view on the importance of diversity (3) Diversity’s impact on innovation, and (4) Diversity’s impact on company performance. In conjunction with many authors mentioned in this thesis, we also conclude that diversity can have a positive impact on companies. We find that there is a great understanding of diversity within tech companies as well as a positive attitude from managers towards diversity management. We cannot however identify nor confirm that there are any links between diversity management and innovation. We do instead find that a diverse workforce is an important contribution to company performance, and we identify links related to increased innovation capabilities and processes.
Subjects/Keywords: Diversity; Diversity Management; Innovation; Diverse workforce; Technology Companies (Tech companies); Software as a Service (SaaS); Business Administration; Företagsekonomi
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Karimi, S. (2019). Diversity management and innovation in Swedish tech companies : An exploratory study about the understanding of diversity management. (Thesis). Jönköping University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-47099
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Karimi, Sameer. “Diversity management and innovation in Swedish tech companies : An exploratory study about the understanding of diversity management.” 2019. Thesis, Jönköping University. Accessed March 01, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-47099.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Karimi, Sameer. “Diversity management and innovation in Swedish tech companies : An exploratory study about the understanding of diversity management.” 2019. Web. 01 Mar 2021.
Vancouver:
Karimi S. Diversity management and innovation in Swedish tech companies : An exploratory study about the understanding of diversity management. [Internet] [Thesis]. Jönköping University; 2019. [cited 2021 Mar 01].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-47099.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Karimi S. Diversity management and innovation in Swedish tech companies : An exploratory study about the understanding of diversity management. [Thesis]. Jönköping University; 2019. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-47099
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of California – Irvine
6.
Homescu, Andrei.
Securing Statically and Dynamically Compiled Programs using Software Diversity.
Degree: Computer Science, 2015, University of California – Irvine
URL: http://www.escholarship.org/uc/item/0xb2r57p
► Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus on automated software diversity. This is a promising area of…
(more)
▼ Code-reuse attacks are notoriously hard to defeat, and many current solutions to the problem focus on automated software diversity. This is a promising area of research, as diversity attacks one cause of code reuse attacks—the software monoculture. Software diversity raises the costs of an attack by providing users with different variations of the same program. However, modern software diversity implementations are still vulnerable to certain threats: code disclosure attacks and attacks targeted at JIT (just-in-time) compilers for dynamically compiled languages.In this dissertation, we address the pressing problem of building secure systems out of programs written in unsafe languages. Specifically, we use software diversity to present attackers with an unpredictable attack surface. This dissertation contributes new techniques that improve the security, efficiency, and coverage of software diversity. We discuss three practical aspects of software diversity deployment: (i) performance optimization using profile guided code randomization, (ii) transparent code randomization for JIT compilers, and (iii) code hiding support for JIT compilers. We make the following contributions: we show a generic technique to reduce the runtime cost of software diversity, describe the first technique that diversifies the output of JIT compilers and requires no source code changes to the JIT engine, and contribute new techniques to prevent disclosure of diversified code. Specifically, we demonstrate how to switch between execute-only and read-write page permissions to efficiently and comprehensively prevent JIT-oriented exploits.Our in-depth performance and security evaluation shows that software diversity can be efficiently implemented with low overhead (as low as 1% for profile-guided NOP insertion and 7.8% for JIT code hiding) and is an effective defense against a large class of code reuse and code disclosure attacks.
Subjects/Keywords: Computer science; code randomization; compilers; just-in-time compilers; security; software diversity
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Homescu, A. (2015). Securing Statically and Dynamically Compiled Programs using Software Diversity. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/0xb2r57p
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Homescu, Andrei. “Securing Statically and Dynamically Compiled Programs using Software Diversity.” 2015. Thesis, University of California – Irvine. Accessed March 01, 2021.
http://www.escholarship.org/uc/item/0xb2r57p.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Homescu, Andrei. “Securing Statically and Dynamically Compiled Programs using Software Diversity.” 2015. Web. 01 Mar 2021.
Vancouver:
Homescu A. Securing Statically and Dynamically Compiled Programs using Software Diversity. [Internet] [Thesis]. University of California – Irvine; 2015. [cited 2021 Mar 01].
Available from: http://www.escholarship.org/uc/item/0xb2r57p.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Homescu A. Securing Statically and Dynamically Compiled Programs using Software Diversity. [Thesis]. University of California – Irvine; 2015. Available from: http://www.escholarship.org/uc/item/0xb2r57p
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Virginia Tech
7.
Hassan Eltarras, Rami M.
BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment.
Degree: PhD, Electrical and Computer Engineering, 2011, Virginia Tech
URL: http://hdl.handle.net/10919/27790
► The essence of smart pervasive Cyber-Physical Environments (CPEs) is to enhance the dependability, security and efficiency of their encompassing systems and infrastructures and their services.…
(more)
▼ The essence of smart pervasive Cyber-Physical Environments (CPEs) is to enhance the dependability, security and efficiency of their encompassing systems and infrastructures and their services. In CPEs, interactive information resources are integrated and coordinated with physical resources to better serve human users. To bridge the interaction gap between users and the physical environment, a CPE is instrumented with a large number of small devices, called sensors, that are capable of sensing, computing and communicating. Sensors with heterogeneous capabilities should autonomously organize on-demand and interact to furnish real-time, high fidelity information serving a wide variety of user applications with dynamic and evolving requirements. CPEs with their associated networked sensors promise aware services for smart systems and infrastructures with the potential to improve the quality of numerous application domains, in particular mission-critical infrastructure domains. Examples include healthcare, environment protection, transportation, energy, homeland security, and national defense.
To build smart CPEs, Networked Sensor Environments (NSEs) are needed to manage demand-driven sharing of large-scale federated heterogeneous resources among multiple applications and users. We informally define NSE as a tailorable, application agnostic, distributed platform with the purpose of managing a massive number of federated resources with heterogeneous computing, communication, and monitoring capabilities. We perceive the need to develop scalable, trustworthy, cost-effective NSEs. A NSE should be endowed with dynamic and adaptable computing and communication services capable of efficiently running diverse applications with evolving QoS requirements on top of federated distributed resources. NSEs should also enable the development of applications independent of the underlying system and device concerns. To our knowledge, a NSE with the aforementioned capabilities does not currently exist.
The large scale of NSEs, the heterogeneous node capabilities, the highly dynamic topology, and the likelihood of being deployed in inhospitable environments pose formidable challenges for the construction of resilient shared NSE platforms. Additionally, nodes in NSE are often resource challenged and therefore trustworthy node cooperation is required to provide useful services. Furthermore, the failure of NSE nodes due to malicious or non-malicious conditions represents a major threat to the trustworthiness of NSEs. Applications should be able to survive failure of nodes and change their runtime structure while preserving their operational integrity. It is also worth noting that the decoupling of application programming concerns from system and device concerns has not received the appropriate attention in most existing wireless sensor network platforms.
In this dissertation, we present a Biologically-inspired Secure Elastic Networked Sensor Environment (BioSENSE) that synergistically integrates: (1) a novel bio-inspired construction of…
Advisors/Committee Members: Eltoweissy, Mohamed Y. (committeechair), Midkiff, Scott F. (committee member), Chen, Ing-Ray (committee member), Riad, Sedki Mohamed (committee member), DaSilva, Luiz A. (committee member), Youssef, Moustafa (committee member).
Subjects/Keywords: Resilient Architecture; Adaptability; Software Diversity; Middleware; Routing; Biologically-Inspired Design; Sensor Networks
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hassan Eltarras, R. M. (2011). BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/27790
Chicago Manual of Style (16th Edition):
Hassan Eltarras, Rami M. “BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment.” 2011. Doctoral Dissertation, Virginia Tech. Accessed March 01, 2021.
http://hdl.handle.net/10919/27790.
MLA Handbook (7th Edition):
Hassan Eltarras, Rami M. “BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment.” 2011. Web. 01 Mar 2021.
Vancouver:
Hassan Eltarras RM. BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment. [Internet] [Doctoral dissertation]. Virginia Tech; 2011. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10919/27790.
Council of Science Editors:
Hassan Eltarras RM. BioSENSE: Biologically-inspired Secure Elastic Networked Sensor Environment. [Doctoral Dissertation]. Virginia Tech; 2011. Available from: http://hdl.handle.net/10919/27790

NSYSU
8.
Lin, Tse-Min.
Effect of Development Team Diversity on the Performance of Software Projects.
Degree: Master, Information Management, 2005, NSYSU
URL: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724105-192629
► Although the functional enhancement and price decrease of computer hardware have rapidly increased the popularity of computers, quality software is the key to determine the…
(more)
▼ Although the functional enhancement and price decrease of computer hardware have rapidly increased the popularity of computers, quality
software is the key to determine the value of information systems. Unfortunately,
software development is a highly uncertain business. Many projects fail or escalate.
Since
software development is a labor and knowledge intensive taks, proper management of team composition is a critical research issue. The purpose of his research is to explore the relationship between knowledge
diversity of
software team and project performance. Research on team composition and performance is not new. However, few have studied the relationship on
software development team.
In this research, a research framework based on conflict theory is developed and an empirical study was conducted on Taiwanese firms to examine the extended model. Major funding include (1) knowledge
diversity has significant positive effects on task conflict, and the task conflict has significant positive effects on team learning, (2) value
diversity has positive effects on relationship conflict, and the relationship conflict has positive effect on the quality of interaction. These findings are useful in helping decision makers to manage
software project teams by selecting the right team members.
Advisors/Committee Members: Jeng-Bing Chiang (chair), James J. Jiang (chair), Ting-Peng Liang, (committee member).
Subjects/Keywords: value diversity; software project performance; conflict theory; characteristic of task; knowledge diversity
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Lin, T. (2005). Effect of Development Team Diversity on the Performance of Software Projects. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724105-192629
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Lin, Tse-Min. “Effect of Development Team Diversity on the Performance of Software Projects.” 2005. Thesis, NSYSU. Accessed March 01, 2021.
http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724105-192629.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Lin, Tse-Min. “Effect of Development Team Diversity on the Performance of Software Projects.” 2005. Web. 01 Mar 2021.
Vancouver:
Lin T. Effect of Development Team Diversity on the Performance of Software Projects. [Internet] [Thesis]. NSYSU; 2005. [cited 2021 Mar 01].
Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724105-192629.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Lin T. Effect of Development Team Diversity on the Performance of Software Projects. [Thesis]. NSYSU; 2005. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0724105-192629
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
9.
Rodriguez Cancio, Marcelino.
Contributions on approximate computing techniques and how to measure them : Contributions sur les techniques de computation approximée et comment les mesurer.
Degree: Docteur es, Informatique, 2017, Rennes 1
URL: http://www.theses.fr/2017REN1S071
► La Computation Approximée est basée dans l'idée que des améliorations significatives de l'utilisation du processeur, de l'énergie et de la mémoire peuvent être réalisées, lorsque…
(more)
▼ La Computation Approximée est basée dans l'idée que des améliorations significatives de l'utilisation du processeur, de l'énergie et de la mémoire peuvent être réalisées, lorsque de faibles niveaux d'imprécision peuvent être tolérés. C'est un concept intéressant, car le manque de ressources est un problème constant dans presque tous les domaines de l'informatique. Des grands superordinateurs qui traitent les big data d'aujourd'hui sur les réseaux sociaux, aux petits systèmes embarqués à contrainte énergétique, il y a toujours le besoin d'optimiser la consommation de ressources. La Computation Approximée propose une alternative à cette rareté, introduisant la précision comme une autre ressource qui peut à son tour être échangée par la performance, la consommation d'énergie ou l'espace de stockage. La première partie de cette thèse propose deux contributions au domaine de l'informatique approximative: Aproximate Loop Unrolling : optimisation du compilateur qui exploite la nature approximative des données de séries chronologiques et de signaux pour réduire les temps d'exécution et la consommation d'énergie des boucles qui le traitent. Nos expériences ont montré que l'optimisation augmente considérablement les performances et l'efficacité énergétique des boucles optimisées (150% - 200%) tout en préservant la précision à des niveaux acceptables. Primer: le premier algorithme de compression avec perte pour les instructions de l'assembleur, qui profite des zones de pardon des programmes pour obtenir un taux de compression qui surpasse techniques utilisées actuellement jusqu'à 10%. L'objectif principal de la Computation Approximée est d'améliorer l'utilisation de ressources, telles que la performance ou l'énergie. Par conséquent, beaucoup d'efforts sont consacrés à l'observation du bénéfice réel obtenu en exploitant une technique donnée à l'étude. L'une des ressources qui a toujours été difficile à mesurer avec précision, est le temps d'exécution. Ainsi, la deuxième partie de cette thèse propose l'outil suivant : AutoJMH : un outil pour créer automatiquement des microbenchmarks de performance en Java. Microbenchmarks fournissent l'évaluation la plus précis de la performance. Cependant, nécessitant beaucoup d'expertise, il subsiste un métier de quelques ingénieurs de performance. L'outil permet (grâce à l'automatisation) l'adoption de microbenchmark par des non-experts. Nos résultats montrent que les microbencharks générés, correspondent à la qualité des manuscrites par des experts en performance. Aussi ils surpassent ceux écrits par des développeurs professionnels dans Java sans expérience en microbenchmarking.
Approximate Computing is based on the idea that significant improvements in CPU, energy and memory usage can be achieved when small levels of inaccuracy can be tolerated. This is an attractive concept, since the lack of resources is a constant problem in almost all computer science domains. From large super-computers processing today’s social media big data, to small, energy-constraint embedded systems, there is…
Advisors/Committee Members: Baudry, Benoit (thesis director), Combemale, Benoît (thesis director).
Subjects/Keywords: Computation Approximée; Optimisation des compilateurs; Diversité logicielle; Compression avec perte; Microbenchmark; Approximate computing; Compiler optimizations; Software diversity; Lossy compression; Microbenchmark
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Rodriguez Cancio, M. (2017). Contributions on approximate computing techniques and how to measure them : Contributions sur les techniques de computation approximée et comment les mesurer. (Doctoral Dissertation). Rennes 1. Retrieved from http://www.theses.fr/2017REN1S071
Chicago Manual of Style (16th Edition):
Rodriguez Cancio, Marcelino. “Contributions on approximate computing techniques and how to measure them : Contributions sur les techniques de computation approximée et comment les mesurer.” 2017. Doctoral Dissertation, Rennes 1. Accessed March 01, 2021.
http://www.theses.fr/2017REN1S071.
MLA Handbook (7th Edition):
Rodriguez Cancio, Marcelino. “Contributions on approximate computing techniques and how to measure them : Contributions sur les techniques de computation approximée et comment les mesurer.” 2017. Web. 01 Mar 2021.
Vancouver:
Rodriguez Cancio M. Contributions on approximate computing techniques and how to measure them : Contributions sur les techniques de computation approximée et comment les mesurer. [Internet] [Doctoral dissertation]. Rennes 1; 2017. [cited 2021 Mar 01].
Available from: http://www.theses.fr/2017REN1S071.
Council of Science Editors:
Rodriguez Cancio M. Contributions on approximate computing techniques and how to measure them : Contributions sur les techniques de computation approximée et comment les mesurer. [Doctoral Dissertation]. Rennes 1; 2017. Available from: http://www.theses.fr/2017REN1S071
10.
Laperdrix, Pierre.
Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures : Empreinte digitale d'appareil : exploration de la diversité des terminaux modernes pour renforcer l'authentification en ligne et construire des contremesures côté client.
Degree: Docteur es, Informatique, 2017, Rennes, INSA
URL: http://www.theses.fr/2017ISAR0016
► L'arrivée de l'Internet a révolutionné notre société à l'aube du 21e siècle. Nos habitudes se sont métamorphosées pour prendre en compte cette nouvelle manière de…
(more)
▼ L'arrivée de l'Internet a révolutionné notre société à l'aube du 21e siècle. Nos habitudes se sont métamorphosées pour prendre en compte cette nouvelle manière de communiquer el de partager avec le monde. Grâce aux technologies qui en constituent ses fondations, le web est une plateforme universelle Que vous utilisiez un PC de bureau sous Windows, un PC portable sous MacOS, un serveur sous Linux ou une tablette sous Android, chacun a les moyens de se connecter à ce réseau de réseaux pour partager avec le monde. La technique dite de Browser fingerprinting est née de celle diversité logicielle et matérielle qui compose nos appareils du quotidien. En exécutant un script dans le navigateur web d'un utilisateur, un serveur peut récupér une très grande quantité d'informations. Il a été démontré qu'il est possible d'identifier de façon unique un appareil en récoltant suffisamment d'informations. L'impact d'une telle approche sur la vie privée des internautes est alors conséquente, car le browser fingerprinting est totalement indépendant des systèmes de traçage connu comme les cookies. Dans celle thèse, nous apportons les contributions suivantes : une analyse de 118 934 empreintes, deux contre-mesures appelées Blink et FPRandom et un protocole d'authentification basé sur le canvas fingerprinting. Le browser fingerprinting est un domaine fascinant qui en est encore à ses balbutiements. Avec cette thèse, nous contribuons à l'écriture des premières pages de son histoire en fournissant une vue d'ensemble du domaine, de ses fondations jusqu'à l'impact des nouvelles technologies du web sur cette technique. Nous nous tournons aussi vers le futur via l'exploration d'une nouvelle facette du domaine afin d'améliorer la sécurité des comptes sur Internet.
Users are presented with an ever-increasing number of choices to connect to the Internet. From desktops, laptops, tablets and smartphones, anyone can find the perfect device that suits his or her needs while factoring mobility, size or processing power. Browser fingerprinting became a reality thanks to the software and hardware diversity that compose every single one of our modem devices. By collecting device-specific information with a simple script running in the browser, a server can fully or partially identify a device on the web and follow it wherever it goes. This technique presents strong privacy implications as it does not require the use of stateful identifiers like cookies that can be removed or managed by the user. In this thesis, we provide the following contributions: an analysis of 118,934 genuine fingerprints to understand the current state of browser fingerprinting, two countermeasures called Blink and FPRandom and a complete protocol based on canvas fingerprinting to augment authentication on the web. Browser fingerprinting is still in its early days. As the web is in constant evolution and as browser vendors keep pushing the limits of what we can do online, the contours of this technique are continually changing. With this dissertation, we shine a light into its…
Advisors/Committee Members: Baudry, Benoit (thesis director).
Subjects/Keywords: Browser fingerprinting; Diversité logicielle; Authentification; Traçage sur internet; Browser fingerprinting; Software diversity; Authentication; Online tracking; 005.8
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Laperdrix, P. (2017). Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures : Empreinte digitale d'appareil : exploration de la diversité des terminaux modernes pour renforcer l'authentification en ligne et construire des contremesures côté client. (Doctoral Dissertation). Rennes, INSA. Retrieved from http://www.theses.fr/2017ISAR0016
Chicago Manual of Style (16th Edition):
Laperdrix, Pierre. “Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures : Empreinte digitale d'appareil : exploration de la diversité des terminaux modernes pour renforcer l'authentification en ligne et construire des contremesures côté client.” 2017. Doctoral Dissertation, Rennes, INSA. Accessed March 01, 2021.
http://www.theses.fr/2017ISAR0016.
MLA Handbook (7th Edition):
Laperdrix, Pierre. “Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures : Empreinte digitale d'appareil : exploration de la diversité des terminaux modernes pour renforcer l'authentification en ligne et construire des contremesures côté client.” 2017. Web. 01 Mar 2021.
Vancouver:
Laperdrix P. Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures : Empreinte digitale d'appareil : exploration de la diversité des terminaux modernes pour renforcer l'authentification en ligne et construire des contremesures côté client. [Internet] [Doctoral dissertation]. Rennes, INSA; 2017. [cited 2021 Mar 01].
Available from: http://www.theses.fr/2017ISAR0016.
Council of Science Editors:
Laperdrix P. Browser Fingerprinting : Exploring Device Diversity to Augment Authentification and Build Client-Side Countermeasures : Empreinte digitale d'appareil : exploration de la diversité des terminaux modernes pour renforcer l'authentification en ligne et construire des contremesures côté client. [Doctoral Dissertation]. Rennes, INSA; 2017. Available from: http://www.theses.fr/2017ISAR0016

University of Alberta
11.
Shahbazi, Ali.
Diversity-Based Automated Test Case Generation.
Degree: PhD, Department of Electrical and Computer
Engineering, 2015, University of Alberta
URL: https://era.library.ualberta.ca/files/ct435gd13q
► Software testing is an expensive task that consumes around half of a project’s effort. To reduce the cost of testing and improve the software quality,…
(more)
▼ Software testing is an expensive task that consumes
around half of a project’s effort. To reduce the cost of testing
and improve the software quality, test cases can be produced
automatically. Random Testing (RT) is a low cost and
straightforward automated test generation approach. However, its
effectiveness is not satisfactory. To increase the effectiveness of
RT, researchers have developed more effective test generation
approaches such as Adaptive Random Testing (ART) which improves the
testing by increasing the test case coverage of the input domain.
This research proposes new test case generation methods that
improve the effectiveness of the test cases by increasing the
diversity of the test cases. Numerical, string, and tree test case
structures are investigated. For numerical test generation, the use
of Centroidal Voronoi Tessellations (CVT) is proposed. Accordingly,
a test case generation method, namely Random Border CVT (RBCVT), is
introduced which can enhance the previous RT methods to improve
their coverage of the input space. The generated numerical test
cases by the other methods act as the input to the RBCVT algorithm
and the output is an improved set of test cases. An extensive
simulation study and a mutant based software testing investigation
have been performed demonstrating that RBCVT outperforms previous
methods. For string test cases, two objective functions are
introduced to produce effective test cases. The diversity of the
test cases is the first objective, where it can be measured through
string distance functions. The second objective is guiding the
string length distribution into a Benford distribution which
implies shorter strings have, in general, a higher chance of
failure detection. When both objectives are enforced via a
multi-objective optimization algorithm, superior string test sets
are produced. An empirical study is performed with several
real-world programs indicating that the generated string test cases
outperform test cases generated by other methods. Prior to tree
test generation study, a new tree distance function is proposed.
Although several distance or similarity functions for trees have
been introduced, their failure detection performance is not always
satisfactory. This research proposes a new similarity function for
trees, namely Extended Subtree (EST), where a new subtree mapping
is proposed. EST generalizes the edit base distances by providing
new rules for subtree mapping. Further, the new approach seeks to
resolve the problems and limitations of previous approaches.
Extensive evaluation frameworks are developed to evaluate the
performance of the new approach against previous methods.
Clustering and classification case studies are performed to provide
an evaluation against different tree distance functions. The
experimental results demonstrate the superior performance of the
proposed distance function. In addition, an empirical runtime
analysis demonstrates that the new approach is one of the best tree
distance functions in terms of runtime efficiency. Finally, the…
Subjects/Keywords: software testing; failure detection; tree test case; diversity-based test generation; string test case; tree distance; black-box test generation; tree similarity; test case generation; automated software testing
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Shahbazi, A. (2015). Diversity-Based Automated Test Case Generation. (Doctoral Dissertation). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/ct435gd13q
Chicago Manual of Style (16th Edition):
Shahbazi, Ali. “Diversity-Based Automated Test Case Generation.” 2015. Doctoral Dissertation, University of Alberta. Accessed March 01, 2021.
https://era.library.ualberta.ca/files/ct435gd13q.
MLA Handbook (7th Edition):
Shahbazi, Ali. “Diversity-Based Automated Test Case Generation.” 2015. Web. 01 Mar 2021.
Vancouver:
Shahbazi A. Diversity-Based Automated Test Case Generation. [Internet] [Doctoral dissertation]. University of Alberta; 2015. [cited 2021 Mar 01].
Available from: https://era.library.ualberta.ca/files/ct435gd13q.
Council of Science Editors:
Shahbazi A. Diversity-Based Automated Test Case Generation. [Doctoral Dissertation]. University of Alberta; 2015. Available from: https://era.library.ualberta.ca/files/ct435gd13q

Université du Luxembourg
12.
Matinnejad, Reza.
AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN.
Degree: 2016, Université du Luxembourg
URL: http://orbilu.uni.lu/handle/10993/28688
► Context. Simulink/Stateflow is an advanced system modeling platform which is prevalently used in the Cyber Physical Systems domain, e.g., automotive industry, to implement software con-…
(more)
▼ Context. Simulink/Stateflow is an advanced system modeling platform which is prevalently used in the Cyber Physical Systems domain, e.g., automotive industry, to implement
software con- trollers. Testing Simulink models is complex and poses several challenges to research and prac- tice. Simulink models often have mixed discrete-continuous behaviors and their correct behav- ior crucially depends on time. Inputs and outputs of Simulink models are signals, i.e., values evolving over time, rather than discrete values. Further, Simulink models are required to operate satisfactory for a large variety of hardware configurations. Finally, developing test oracles for Simulink models is challenging, particularly for requirements capturing their continuous aspects. In this dissertation, we focus on testing mixed discrete-continuous aspects of Simulink models, an important, yet not well-studied, problem. The existing Simulink testing techniques are more amenable to testing and verification of logical and state-based properties. Further, they are mostly incompatible with Simulink models containing time-continuos blocks, and floating point and non- linear computations. In addition, they often rely on the presence of formal specifications, which are expensive and rare in practice, to automate test oracles.
Approach. In this dissertation, we propose a set of approaches based on meta-heuristic search and machine learning techniques to automate testing of
software controllers implemented in Simulink. The work presented in this dissertation is motived by Simulink testing needs at Delphi Automotive Systems, a world leading part supplier to the automotive industry. To address the above-mentioned challenges, we rely on discrete-continuous output signals of Simulink models and provide output- based black-box test generation techniques to produce test cases with high fault-revealing ability. Our algorithms are black-box, hence, compatible with Simulink/Stateflow models in their en- tirety. Further, we do not rely on the presence of formal specifications to automate test oracles. Specifically, we propose two sets of test generation algorithms for closed-loop and open-loop con- trollers implemented in Simulink: (1) For closed-loop controllers, test oracles can be formalized and automated relying on the feedback received from the controlled system. We characterize the desired behavior of closed-loop controllers in a set of common requirements, and then use search to identify the worst-case test scenarios of the controller with respect to each requirement. (2) For open-loop controllers, we cannot automate test oracles since the feedback is not available, and test oracles are manual. Hence, we focus on providing test generation algorithms that develop small effective test suites with high fault revealing ability. We further provide a test case prioriti- zation algorithm to rank the generated test cases based on their fault revealing ability and lower the manual oracle cost.
Our test generation and prioritization algorithms are evaluated with…
Advisors/Committee Members: Fonds National de la Recherche - FnR [sponsor], Briand, Lionel [superviser], Nejati, Shiva [member of the jury].
Subjects/Keywords: Simulink models; software testing; test generation; test oracle; search-based software testing; output diversity; Engineering, computing & technology :: Computer science [C05]; Ingénierie, informatique & technologie :: Sciences informatiques [C05]
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Matinnejad, R. (2016). AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN. (Doctoral Dissertation). Université du Luxembourg. Retrieved from http://orbilu.uni.lu/handle/10993/28688
Chicago Manual of Style (16th Edition):
Matinnejad, Reza. “AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN.” 2016. Doctoral Dissertation, Université du Luxembourg. Accessed March 01, 2021.
http://orbilu.uni.lu/handle/10993/28688.
MLA Handbook (7th Edition):
Matinnejad, Reza. “AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN.” 2016. Web. 01 Mar 2021.
Vancouver:
Matinnejad R. AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN. [Internet] [Doctoral dissertation]. Université du Luxembourg; 2016. [cited 2021 Mar 01].
Available from: http://orbilu.uni.lu/handle/10993/28688.
Council of Science Editors:
Matinnejad R. AUTOMATED TESTING OF SIMULINK/STATEFLOW MODELS IN THE AUTOMOTIVE DOMAIN. [Doctoral Dissertation]. Université du Luxembourg; 2016. Available from: http://orbilu.uni.lu/handle/10993/28688
13.
WANG ZHIYI.
UNDERSTANDING ONLINE INNOVATION COMMUNITY: AN INVESTIGATION OF GROUP DIVERSITY IN OPEN COLLABORATION.
Degree: 2018, National University of Singapore
URL: http://scholarbank.nus.edu.sg/handle/10635/152761
Subjects/Keywords: Innovation Communities; Open Innovation; Crowdsourcing; Open Source Software; Collaboration; Diversity
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
ZHIYI, W. (2018). UNDERSTANDING ONLINE INNOVATION COMMUNITY: AN INVESTIGATION OF GROUP DIVERSITY IN OPEN COLLABORATION. (Thesis). National University of Singapore. Retrieved from http://scholarbank.nus.edu.sg/handle/10635/152761
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
ZHIYI, WANG. “UNDERSTANDING ONLINE INNOVATION COMMUNITY: AN INVESTIGATION OF GROUP DIVERSITY IN OPEN COLLABORATION.” 2018. Thesis, National University of Singapore. Accessed March 01, 2021.
http://scholarbank.nus.edu.sg/handle/10635/152761.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
ZHIYI, WANG. “UNDERSTANDING ONLINE INNOVATION COMMUNITY: AN INVESTIGATION OF GROUP DIVERSITY IN OPEN COLLABORATION.” 2018. Web. 01 Mar 2021.
Vancouver:
ZHIYI W. UNDERSTANDING ONLINE INNOVATION COMMUNITY: AN INVESTIGATION OF GROUP DIVERSITY IN OPEN COLLABORATION. [Internet] [Thesis]. National University of Singapore; 2018. [cited 2021 Mar 01].
Available from: http://scholarbank.nus.edu.sg/handle/10635/152761.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
ZHIYI W. UNDERSTANDING ONLINE INNOVATION COMMUNITY: AN INVESTIGATION OF GROUP DIVERSITY IN OPEN COLLABORATION. [Thesis]. National University of Singapore; 2018. Available from: http://scholarbank.nus.edu.sg/handle/10635/152761
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
14.
Fargo, Farah Emad.
Resilient Cloud Computing and Services
.
Degree: 2015, University of Arizona
URL: http://hdl.handle.net/10150/347137
► Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted…
(more)
▼ Cloud Computing is emerging as a new paradigm that aims at delivering computing as a utility. For the cloud computing paradigm to be fully adopted and effectively used it is critical that the security mechanisms are robust and resilient to malicious faults and attacks. Securing cloud is a challenging research problem because it suffers from current cybersecurity problems in computer networks and data centers and additional complexity introduced by virtualizations, multi-tenant occupancy, remote storage, and cloud management. It is widely accepted that we cannot build
software and computing systems that are free from vulnerabilities and that cannot be penetrated or attacked. Furthermore, it is widely accepted that cyber resilient techniques are the most promising solutions to mitigate cyberattacks and change the game to advantage defender over attacker. Moving Target Defense (MTD) has been proposed as a mechanism to make it extremely challenging for an attacker to exploit existing vulnerabilities by varying different aspects of the execution environment. By continuously changing the environment (e.g. Programming language, Operating System, etc.) we can reduce the attack surface and consequently, the attackers will have very limited time to figure out current execution environment and vulnerabilities to be exploited. In this dissertation, we present a methodology to develop an Autonomic Resilient Cloud Management (ARCM) based on MTD and autonomic computing. The proposed research will utilize the following capabilities:
Software Behavior Obfuscation (SBO), replication,
diversity, and Autonomic Management (AM). SBO employs spatiotemporal behavior hiding or encryption and MTD to make
software components change their implementation versions and resources randomly to avoid exploitations and penetrations.
Diversity and random execution is achieved by using AM that will randomly "hot" shuffling multiple functionally-equivalent, behaviorally-different
software versions at runtime (e.g., the
software task can have multiple versions implemented in a different language and/or run on a different platform). The execution environment encryption will make it extremely difficult for an attack to disrupt normal operations of cloud. In this work, we evaluated the performance overhead and effectiveness of the proposed ARCM approach to secure and protect a wide range of cloud applications such as MapReduce and scientific and engineering applications.
Advisors/Committee Members: Hariri, Salim (advisor), Akoglu, Ali (committeemember), Wang, Janet (committeemember), Hariri, Salim (committeemember).
Subjects/Keywords: cloud computing;
redundancy;
resilient cloud services;
software behavior obfuscation;
software diversity;
Electrical & Computer Engineering;
autonomic computing
…of attackers to succeed in launching attacks
through software diversity, redundancy and… …having multiple version of the software) and Hardware Redundancy.
B. Diversity and… …38
Figure 6. Diversity and timing impact on attacks… …cannot build software and computing systems that are free from
vulnerabilities and that cannot… …utilize the following capabilities: Software
Behavior Obfuscation (SBO), replication…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Fargo, F. E. (2015). Resilient Cloud Computing and Services
. (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/347137
Chicago Manual of Style (16th Edition):
Fargo, Farah Emad. “Resilient Cloud Computing and Services
.” 2015. Doctoral Dissertation, University of Arizona. Accessed March 01, 2021.
http://hdl.handle.net/10150/347137.
MLA Handbook (7th Edition):
Fargo, Farah Emad. “Resilient Cloud Computing and Services
.” 2015. Web. 01 Mar 2021.
Vancouver:
Fargo FE. Resilient Cloud Computing and Services
. [Internet] [Doctoral dissertation]. University of Arizona; 2015. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10150/347137.
Council of Science Editors:
Fargo FE. Resilient Cloud Computing and Services
. [Doctoral Dissertation]. University of Arizona; 2015. Available from: http://hdl.handle.net/10150/347137
15.
Lefever, Ryan M.
Diverse partial memory replication.
Degree: PhD, 1200, 2011, University of Illinois – Urbana-Champaign
URL: http://hdl.handle.net/2142/24042
► An important approach for software dependability is the use of diversity to detect and/or tolerate errors. We develop and evaluate an approach for automated program…
(more)
▼ An important approach for
software dependability is the use of
diversity to detect and/or tolerate errors. We develop and evaluate an approach for automated program
diversity called Diverse Partial Memory Replication (DPMR), aimed at detecting memory safety errors. DPMR is an automatic compiler transformation that replicates some subset of an executable's data memory and applies one or more
diversity transformations to the replica. DPMR can detect any kind of memory safety error in any part of a program's data memory. Moreover, DPMR is novel because it uses partial replication within a single address space, replicating (and comparing) only a subset of a program's memory. We propose and evaluate two strategies for handling pointers stored in memory, a key challenge to DPMR. We also perform a detailed study of the
diversity mechanisms and state comparison policies in DPMR (a first of its kind for such
diversity approaches), which is valuable for exploiting the high flexibility of DPMR. Finally, we explore the use of Data Structure Analysis to eliminate nearly all restrictions on input programs that would otherwise be necessary.
Advisors/Committee Members: Sanders, William H. (advisor), Adve, Vikram S. (advisor), Sanders, William H. (Committee Chair), Adve, Vikram S. (committee member), Nicol, David M. (committee member), Patel, Sanjay J. (committee member).
Subjects/Keywords: diverse partial memory replication; software memory errors; memory safety; software diversity; replication; partial replication; fault injection; experimental evaluation
…Replica
Memory
Figure 1.1: Example motivating the use of diversity
execution to detect software… …software memory safety and software diversity.
8
1.5.1 Software Memory Safety
As discussed at… …variables, while DPMR does handle all of those error
classes.
14
1.5.2 Software Diversity
The… …other category of work that is closely related to DPMR is software diversity. Software… …software diversity, including several in the last 15 years. The software diversity
research most…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Lefever, R. M. (2011). Diverse partial memory replication. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/24042
Chicago Manual of Style (16th Edition):
Lefever, Ryan M. “Diverse partial memory replication.” 2011. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed March 01, 2021.
http://hdl.handle.net/2142/24042.
MLA Handbook (7th Edition):
Lefever, Ryan M. “Diverse partial memory replication.” 2011. Web. 01 Mar 2021.
Vancouver:
Lefever RM. Diverse partial memory replication. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2011. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/2142/24042.
Council of Science Editors:
Lefever RM. Diverse partial memory replication. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2011. Available from: http://hdl.handle.net/2142/24042

Universidade Federal do Maranhão
16.
ULYSSES SANTOS SOUSA.
CLASSIFICAÇÃO DE MASSAS NA MAMA A PARTIR DE IMAGENS MAMOGRÁFICAS USANDO ÍNDICE DE DIVERSIDADE DE SHANNON-WIENER.
Degree: 2011, Universidade Federal do Maranhão
URL: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=614
► O câncer é um dos maiores problemas de saúde mundial, sendo o câncer de mama o que mais causa óbito entre as mulheres e o…
(more)
▼ O câncer é um dos maiores problemas de saúde mundial, sendo o câncer de mama o que mais causa óbito entre as mulheres e o segundo tipo mais freqüente no mundo. As chances de uma paciente sobreviver ao câncer de mama aumentam à medida que a doença é descoberta mais cedo. Diversos Sistemas de Detecção e Diagnóstico auxiliados por computador (Computer Aided Detection/Diagnosis) têm sido utilizados para auxiliar profissionais de saúde. Este trabalho apresenta uma metodologia de discriminação e classificação de regiões de tecidos de mamografias em massa e não massa. Para este propósito utiliza-se o Índice de Diversidade de Shannon-Wiener, comumente aplicado para medir a biodiversidade em um ecossistema, para descrever padrões de regiões de imagens de mama com quatro abordagens: global, em círculos, em anéis e direcional. Em seguida, utiliza-se o classificador Support Vector Machine para classificar estas regiões em massa e não massa. A metodologia apresenta resultados promissores para a classificação de regiões de tecidos de mamografia em massa e não massa, obtendo uma acurácia máxima de 99,85%.
Cancer is one of the biggest health problems worldwide, and the breast cancer is the one that causes more deaths among women. Also it is the second most frequent type in the world. The chances of survival for a patient with breast cancer increases the sooner this disease is discovered. Several Computer Aided Detection/Diagnosis Systems has been used to assist health professionals. This work presents a methodology to discriminate and classify mammographic tissues regions in mass and non-mass. For this purpose the Shannon-Wiener‟s Diversity Index, which is applied to measure the biodiversity in ecosystem, is used to describe pattern of breast image region with four approaches: global, in circles, in rings and directional. After, a Support Vector Machine is used to classify the regions in mass and non-mass. The methodology presents promising results for classification of mammographic tissues regions in mass and non-mass, achieving 99.85% maximum accuracy.
Advisors/Committee Members: Zair Abdelouahab, Aristófanes Corrêa Silva, Anselmo Cardoso Paiva.
Subjects/Keywords: Mamografia; Classificação de tecidos de mama; Índice de Diversidade de Shannon-Wiener; Máquina de Vetores de Suporte; ENGENHARIA DE SOFTWARE; Mammography; Breast tissue classification; Shannon-Wiener Diversity Index; Support Vector Machine
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
SOUSA, U. S. (2011). CLASSIFICAÇÃO DE MASSAS NA MAMA A PARTIR DE IMAGENS MAMOGRÁFICAS USANDO ÍNDICE DE DIVERSIDADE DE SHANNON-WIENER. (Thesis). Universidade Federal do Maranhão. Retrieved from http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=614
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
SOUSA, ULYSSES SANTOS. “CLASSIFICAÇÃO DE MASSAS NA MAMA A PARTIR DE IMAGENS MAMOGRÁFICAS USANDO ÍNDICE DE DIVERSIDADE DE SHANNON-WIENER.” 2011. Thesis, Universidade Federal do Maranhão. Accessed March 01, 2021.
http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=614.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
SOUSA, ULYSSES SANTOS. “CLASSIFICAÇÃO DE MASSAS NA MAMA A PARTIR DE IMAGENS MAMOGRÁFICAS USANDO ÍNDICE DE DIVERSIDADE DE SHANNON-WIENER.” 2011. Web. 01 Mar 2021.
Vancouver:
SOUSA US. CLASSIFICAÇÃO DE MASSAS NA MAMA A PARTIR DE IMAGENS MAMOGRÁFICAS USANDO ÍNDICE DE DIVERSIDADE DE SHANNON-WIENER. [Internet] [Thesis]. Universidade Federal do Maranhão; 2011. [cited 2021 Mar 01].
Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=614.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
SOUSA US. CLASSIFICAÇÃO DE MASSAS NA MAMA A PARTIR DE IMAGENS MAMOGRÁFICAS USANDO ÍNDICE DE DIVERSIDADE DE SHANNON-WIENER. [Thesis]. Universidade Federal do Maranhão; 2011. Available from: http://www.tedebc.ufma.br//tde_busca/arquivo.php?codArquivo=614
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Victoria
17.
Tongay, Karan Naresh.
Privacy preserving software engineering for data driven development.
Degree: Department of Computer Science, 2020, University of Victoria
URL: http://hdl.handle.net/1828/12446
► The exponential rise in the generation of data has introduced many new areas of research including data science, data engineering, machine learning, artificial in- telligence…
(more)
▼ The exponential rise in the generation of data has introduced many new areas of research including data science, data engineering, machine learning, artificial in- telligence to name a few. It has become important for any industry or organization to precisely understand and analyze the data in order to extract value out of the data. The value of the data can only be realized when it is put into practice in the real world and the most common approach to do this in the technology industry is through
software engineering. This brings into picture the area of privacy oriented
software engineering and thus there is a rise of data protection regulation acts such as GDPR (General Data Protection Regulation), PDPA (Personal Data Protection Act), etc. Many organizations, governments and companies who have accumulated huge amounts of data over time may conveniently use the data for increasing business value but at the same time the privacy aspects associated with the sensitivity of data especially in terms of personal information of the people can easily be circumvented while designing a
software engineering model for these types of applications. Even before the
software engineering phase for any data processing application, often times there can be one or many data sharing agreements or privacy policies in place. Every organization may have their own way of maintaining data privacy practices for data driven development. There is a need to generalize or categorize their approaches into tactics which could be referred by other practitioners who are trying to integrate data privacy practices into their development. This qualitative study provides an understanding of various approaches and tactics that are being practised within the industry for privacy preserving data science in
software engineering, and discusses a tool for data usage monitoring to identify unethical data access. Finally, we studied strategies for secure data publishing and conducted experiments using sample data to demonstrate how these techniques can be helpful for securing private data before publishing.
Advisors/Committee Members: Ernst, Neil A. (supervisor).
Subjects/Keywords: Data Privacy; Privacy; Data Engineering; Software Engineering; Data Driven Developers; Data Science; Privacy Preserving; Data Driven Development; Machine Learning; One class SVM; Data Usage Monitoring; Health data; k-anonymity; l-diversity; differential privacy; Information management; Secure data sharing; Survey; Audits and access control; Data Privacy Tactics
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Tongay, K. N. (2020). Privacy preserving software engineering for data driven development. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/12446
Chicago Manual of Style (16th Edition):
Tongay, Karan Naresh. “Privacy preserving software engineering for data driven development.” 2020. Masters Thesis, University of Victoria. Accessed March 01, 2021.
http://hdl.handle.net/1828/12446.
MLA Handbook (7th Edition):
Tongay, Karan Naresh. “Privacy preserving software engineering for data driven development.” 2020. Web. 01 Mar 2021.
Vancouver:
Tongay KN. Privacy preserving software engineering for data driven development. [Internet] [Masters thesis]. University of Victoria; 2020. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/1828/12446.
Council of Science Editors:
Tongay KN. Privacy preserving software engineering for data driven development. [Masters Thesis]. University of Victoria; 2020. Available from: http://hdl.handle.net/1828/12446
18.
Jameson, Brian Douglas.
A NOVEL MULTI-FUNCTIONAL SOFTWARE-DEFINED RADAR: THEORY
& EXPERIMENTS.
Degree: MS, Computational Science and Engineering, 2013, Miami University
URL: http://rave.ohiolink.edu/etdc/view?acc_num=miami1375821039
► This thesis presents theoretical analysis and experimental evidence to demonstrate the feasibility of an ultra-wideband (UWB) software-defined radar sensor (SDRS) for simultaneous platform positioning and…
(more)
▼ This thesis presents theoretical analysis and
experimental evidence to demonstrate the feasibility of an
ultra-wideband (UWB)
software-defined radar sensor (SDRS) for
simultaneous platform positioning and target detection in unknown
indoor environments. Orthogonal frequency division multiplexing
(OFDM) is used to modulate the UWB SDRS signal. Spectral responses
from targets at each of the OFDM sub-carriers are investigated
experimentally and the results are used to develop effective
sensing and discrimination functions for different types of target
materials, signal incidence direction, range, and incidence power
levels. When performed concurrently, these developed functions have
the potential to assist the SDRS in navigating itself through
unknown indoor environments with no prior knowledge of the contents
or geometry of the environment. Simulations and experiments are
presented to display the effectiveness of the SDRS at providing a
position solution while also detecting target of
interest.
Advisors/Committee Members: Garmatyuk, Dmitriy (Advisor), Morton, Yu (Advisor).
Subjects/Keywords: Engineering; radar; OFDM; autonomous; UWB; software; software-defined; software defined; orthogonal frequency divisition multiplexing; detection; navigation; profiles; diversity; ultra-wideband; SDRS; sensors; multi-function
…diversity of the received waveforms. This diversity, combined with the
software-driven… …continually enhanced by
the improvement of signal processing hardware and software algorithms… …the implementation of a multi-function software-defined radar sensor
(SDRS) for use… …includes an overview of of
software-defined systems. The design and implementation of hardware and… …software that
comprise the SDRS utilized in this thesis are presented in Chapter 4. Chapter 5…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Jameson, B. D. (2013). A NOVEL MULTI-FUNCTIONAL SOFTWARE-DEFINED RADAR: THEORY
& EXPERIMENTS. (Masters Thesis). Miami University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=miami1375821039
Chicago Manual of Style (16th Edition):
Jameson, Brian Douglas. “A NOVEL MULTI-FUNCTIONAL SOFTWARE-DEFINED RADAR: THEORY
& EXPERIMENTS.” 2013. Masters Thesis, Miami University. Accessed March 01, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=miami1375821039.
MLA Handbook (7th Edition):
Jameson, Brian Douglas. “A NOVEL MULTI-FUNCTIONAL SOFTWARE-DEFINED RADAR: THEORY
& EXPERIMENTS.” 2013. Web. 01 Mar 2021.
Vancouver:
Jameson BD. A NOVEL MULTI-FUNCTIONAL SOFTWARE-DEFINED RADAR: THEORY
& EXPERIMENTS. [Internet] [Masters thesis]. Miami University; 2013. [cited 2021 Mar 01].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=miami1375821039.
Council of Science Editors:
Jameson BD. A NOVEL MULTI-FUNCTIONAL SOFTWARE-DEFINED RADAR: THEORY
& EXPERIMENTS. [Masters Thesis]. Miami University; 2013. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=miami1375821039
19.
Rossler, Carl W, Jr.
Adaptive Radar with Application to Joint Communication and
Synthetic Aperture Radar (CoSAR).
Degree: PhD, Electrical and Computer Engineering, 2013, The Ohio State University
URL: http://rave.ohiolink.edu/etdc/view?acc_num=osu1366144863
► Until recently, the functionality of radar systems has been built into the radar's analog hardware, resulting in radars which are inflexible and that can only…
(more)
▼ Until recently, the functionality of radar systems has
been built into the radar's analog hardware, resulting in radars
which are inflexible and that can only be used for a specific
application. Modern systems, however, driven by the ever increasing
speed of processors and data converters - analog-to-digital (ADC)
and digital-to-analog (DAC) - are transitioning toward
software
defined radar (SDR) systems. The advent of SDRs inevitably leads to
the question of how their added flexibilities can best be
leveraged. The work within this dissertation is motivated by joint
radar and communication functionality. The main objective is to
study and demonstrate the ability of radar systems to employ
non-traditional, specifically, communication waveforms for remote
sensing. A
software defined radar (SDR) is developed. The SDR
features a "closed loop" testbed interface accessible via Matlab
m-code. Here, "closed-loop" means that data can be pulled from the
SDR, processed, then used to select/adapt the waveform and settings
of the SDR without human intervention, i.e. on the fly. The testbed
interface is used to implement a joint radar and communication
system which is capable of collecting and processing radar data,
e.g. range-Doppler maps, while simultaneously communicating
previously collected radar data. Simultaneous functionality is
accomplished by interrogating with a wide band digital
communication waveform which is modulated with the previously
collected radar data. The joint system is used to empirically
demonstrate the theoretical work on detection and change detection
within this dissertation. Optimal detectors are developed for
interrogation with communication waveforms. The optimal detector
for a single target with known impulse response in white noise is
known to be a thresholding of the output of a matched filter. Radar
systems, however, often operate in multi-target environments;
notably air-to-ground synthetic aperture radars. For such
applications, the hypothesis test which shows
matched-filter/thresholding to be optimal does not well represent
the conditions under which the radar is operating. The matched
filter is, therefore, suboptimal due to substantial modeling error.
The optimal detector is related to classical radar detectors. The
expression for the performance of the optimal detector is given.
Its performance is shown to be greater than or equal to that of the
matched filter detector. Optimal coherent change detectors are
developed for diverse waveform interrogation: i.e. when the
reference and mission images are the result of interrogation with
different waveforms. With waveform
diversity, the problem of change
detection becomes more challenging. The optimal coherent change
detection (CCD) does not take the form of the classical CCD and is
not prone to high false alarm rates in areas of low pixel
intensity. Special cases of the optimal coherent change detector
are given under which the change detector reduces to intuitively
satisfying forms.
Advisors/Committee Members: Ertin, Emre (Advisor), Moses, Randolph (Advisor).
Subjects/Keywords: Electrical Engineering; radar; software defined radar; SDR; waveform diversity; adaptive radar; synthetic aperture radar; SAR; detection; change detection; coherent change detection; CCD; communication; passive radar; noise radar
…1
4
A Software Defined Radar System for Joint Communication and Sensing
8
2.1
2.2
2.3… …2.4
2.5
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . .
Software defined… …2.2.2 Ohio State’s SDR: Software . . . . . . . . . . . . . .
Evaluation of common digital… …48
51
53
57
60
65
69
70
70
70
74
Optimal Coherent Change Detection and Waveform Diversity… …2.1
Software defined radar (SDR) block diagram . . . . . . . . . . . . . .
13…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Rossler, Carl W, J. (2013). Adaptive Radar with Application to Joint Communication and
Synthetic Aperture Radar (CoSAR). (Doctoral Dissertation). The Ohio State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=osu1366144863
Chicago Manual of Style (16th Edition):
Rossler, Carl W, Jr. “Adaptive Radar with Application to Joint Communication and
Synthetic Aperture Radar (CoSAR).” 2013. Doctoral Dissertation, The Ohio State University. Accessed March 01, 2021.
http://rave.ohiolink.edu/etdc/view?acc_num=osu1366144863.
MLA Handbook (7th Edition):
Rossler, Carl W, Jr. “Adaptive Radar with Application to Joint Communication and
Synthetic Aperture Radar (CoSAR).” 2013. Web. 01 Mar 2021.
Vancouver:
Rossler, Carl W J. Adaptive Radar with Application to Joint Communication and
Synthetic Aperture Radar (CoSAR). [Internet] [Doctoral dissertation]. The Ohio State University; 2013. [cited 2021 Mar 01].
Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1366144863.
Council of Science Editors:
Rossler, Carl W J. Adaptive Radar with Application to Joint Communication and
Synthetic Aperture Radar (CoSAR). [Doctoral Dissertation]. The Ohio State University; 2013. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=osu1366144863
20.
Campbell, Keith A.
Low-cost error detection through high-level synthesis.
Degree: MS, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign
URL: http://hdl.handle.net/2142/89068
► System-on-chip design is becoming increasingly complex as technology scaling enables more and more functionality on a chip. This scaling and complexity has resulted in a…
(more)
▼ System-on-chip design is becoming increasingly complex as technology scaling enables more and more functionality on a chip. This scaling and complexity has resulted in a variety of reliability and validation challenges including logic bugs, hot spots, wear-out, and soft errors. To make matters worse, as we reach the limits of Dennard scaling, efforts to improve system performance and energy efficiency have resulted in the integration of a wide variety of complex hardware accelerators in SoCs. Thus the challenge is to design complex, custom hardware that is efficient, but also correct and reliable.
High-level synthesis shows promise to address the problem of complex hardware design by providing a bridge from the high-productivity
software domain to the hardware design process. Much research has been done on high-level synthesis efficiency optimizations. This thesis shows that high-level synthesis also has the power to address validation and reliability challenges through two solutions.
One solution for circuit reliability is modulo-3 shadow datapaths: performing lightweight shadow computations in modulo-3 space for each main computation. We leverage the binding and scheduling flexibility of high-level synthesis to detect control errors through diverse binding and minimize area cost through intelligent checkpoint scheduling and modulo-3 reducer sharing. We introduce logic and dataflow optimizations to further reduce cost. We evaluated our technique with 12 high-level synthesis benchmarks from the arithmetic-oriented PolyBench benchmark suite using FPGA emulated netlist-level error injection. We observe coverages of 99.1% for stuck-at faults, 99.5% for soft errors, and 99.6% for timing errors with a 25.7% area cost and negligible performance impact. Leveraging a mean error detection latency of 12.75 cycles (4150x faster than end result check) for soft errors, we also explore a rollback recovery method with an additional area cost of 28.0%, observing a 175x increase in reliability against soft errors.
Another solution for rapid post-silicon validation of accelerator designs is Hybrid Quick Error Detection (H-QED): inserting signature generation logic in a hardware design to create a heavily compressed signature stream that captures the internal behavior of the design at a fine temporal and spatial granularity for comparison with a reference set of signatures generated by high-level simulation to detect bugs. Using H-QED, we demonstrate an improvement in error detection latency (time elapsed from when a bug is activated to when it manifests as an observable failure) of two orders of magnitude and a threefold improvement in bug coverage compared to traditional post-silicon validation techniques. H-QED also uncovered previously unknown bugs in the CHStone benchmark suite, which is widely used by the HLS community. H-QED incurs less than 10% area overhead for the accelerator it validates with negligible performance impact, and we also introduce techniques to minimize any possible intrusiveness introduced by H-QED.
Advisors/Committee Members: Chen, Deming (advisor).
Subjects/Keywords: High-level synthesis; Automation; error detection; scheduling; binding; compiler transformation; compiler optimization; pipelining; modulo arithmetic; logic optimization; state machine; datapath, control logic; shadow logic; low cost; high performance; electrical bugs; Aliasing; stuck-at faults; soft errors; timing errors; checkpointing; rollback; recovery; post-silicon validation; Accelerators; system on a chip; signature generation; execution signatures; execution hashing; logic bugs; nondeterministic bugs; masked errors; circuit reliability; hot spots; wear out; silent data corruption; observability; detection latency; mixed datapath; diversity; checkpoint corruption; error injection; error removal; Quick Error Detection (QED); Hybrid Quick Error Detection (H-QED); hybrid hardware/software; execution tracing; address conversion; undefined behavior; High-Level Synthesis (HLS) engine bugs; detection coverage
…A system designer chooses a custom hardware
design when a pure software solution is… …scaling, improvements in power consumption and performance for CPU-based software platforms have… …such approach. HLS provides a bridge from the high-productivity
software world to the… …design in dialects of traditionally
1
software languages. HLS frees hardware designers from… …using a software compiler.
3. The designer uses a high-level synthesis tool to generate an RTL…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Campbell, K. A. (2015). Low-cost error detection through high-level synthesis. (Thesis). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/89068
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Campbell, Keith A. “Low-cost error detection through high-level synthesis.” 2015. Thesis, University of Illinois – Urbana-Champaign. Accessed March 01, 2021.
http://hdl.handle.net/2142/89068.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Campbell, Keith A. “Low-cost error detection through high-level synthesis.” 2015. Web. 01 Mar 2021.
Vancouver:
Campbell KA. Low-cost error detection through high-level synthesis. [Internet] [Thesis]. University of Illinois – Urbana-Champaign; 2015. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/2142/89068.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Campbell KA. Low-cost error detection through high-level synthesis. [Thesis]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/89068
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
21.
Campbell, Keith A.
Robust and reliable hardware accelerator design through high-level synthesis.
Degree: PhD, Electrical & Computer Engr, 2017, University of Illinois – Urbana-Champaign
URL: http://hdl.handle.net/2142/99294
► System-on-chip design is becoming increasingly complex as technology scaling enables more and more functionality on a chip. This scaling-driven complexity has resulted in a variety…
(more)
▼ System-on-chip design is becoming increasingly complex as technology scaling enables more and more functionality on a chip. This scaling-driven complexity has resulted in a variety of reliability and validation challenges including logic bugs, hot spots, wear-out, and soft errors. To make matters worse, as we reach the limits of Dennard scaling, efforts to improve system performance and energy efficiency have resulted in the integration of a wide variety of complex hardware accelerators in SoCs. Thus the challenge is to design complex, custom hardware that is efficient, but also correct and reliable.
High-level synthesis shows promise to address the problem of complex hardware design by providing a bridge from the high-productivity
software domain to the hardware design process. Much research has been done on high-level synthesis efficiency optimizations. This dissertation shows that high-level synthesis also has the power to address validation and reliability challenges through three automated solutions targeting three key stages in the hardware design and use cycle: pre-silicon debugging, post-silicon validation, and post-deployment error detection.
Our solution for rapid pre-silicon debugging of accelerator designs is hybrid tracing: comparing a datapath-level trace of hardware execution with a reference
software implementation at a fine temporal and spatial granularity to detect logic bugs. An integrated backtrace process delivers source-code meaning to the hardware designer, pinpointing the location of bug activation and providing a strong hint for potential bug fixes. Experimental results show that we are able to detect and aid in localization of logic bugs from both C/C++ specifications as well as the high-level synthesis engine itself.
A variation of this solution tailored for rapid post-silicon validation of accelerator designs is hybrid hashing: inserting signature generation logic in a hardware design to create a heavily compressed signature stream that captures the internal behavior of the design at a fine temporal and spatial granularity for comparison with a reference set of signatures generated by high-level simulation to detect bugs. Using hybrid hashing, we demonstrate an improvement in error detection latency (time elapsed from when a bug is activated to when it manifests as an observable failure) of two orders of magnitude and a threefold improvement in bug coverage compared to traditional post-silicon validation techniques. Hybrid hashing also uncovered previously unknown bugs in the CHStone benchmark suite, which is widely used by the HLS community. Hybrid hashing incurs less than 10% area overhead for the accelerator it validates with negligible performance impact, and we also introduce techniques to minimize any possible intrusiveness introduced by hybrid hashing.
Finally, our solution for post-deployment error detection is modulo-3 shadow datapaths: performing lightweight shadow computations in modulo-3 space for each main computation. We leverage the binding and scheduling…
Advisors/Committee Members: Chen, Deming (advisor), Chen, Deming (Committee Chair), Hwu, Wen-Mei W (committee member), Wong, Martin D F (committee member), Kim, Nam Sung (committee member).
Subjects/Keywords: High-level synthesis (HLS); Automation; Error detection; Scheduling; Binding; Compiler transformation; Compiler optimization; Pipelining; Modulo arithmetic; Modulo-3; Logic optimization; State machine; Datapath; Control logic; Shadow datapath; Modulo datapath; Low cost; High performance; Electrical bug; Aliasing; Stuck-at fault; Soft error; Timing error; Checkpointing; Rollback; Recovery; Pre-silicon validation; Post-silicon validation; Pre-silicon debug; Post-silicon debug; Accelerator; System on a chip; Signature generation; Execution signature; Execution hash; Logic bug; Nondeterministic bug; Masked error; Circuit reliability; Hot spot; Wear out; Silent data corruption; Observability; Detection latency; Mixed datapath; Diversity; Checkpoint corruption; Error injection; Error removal; Quick Error Detection (QED); Hybrid Quick Error Detection (H-QED); Instrumentation; Hybrid co-simulation; Hardware/software; Integration testing; Hybrid tracing; Hybrid hashing; Source-code localization; Software debugging tool; Valgrind; Clang sanitizer; Clang static analyzer; Cppcheck; Root cause analysis; Execution tracing; Realtime error detection; Simulation trigger; Nonintrusive; Address conversion; Undefined behavior; High-level synthesis (HLS) bug; Detection coverage; Gate-level architecture; Mersenne modulus; Full adder; Half adder; Quarter adder; Wraparound; Modulo reducer; Modulo adder; Modulo multiplier; Modulo comparator; Cross-layer; Algorithm; Instruction; Architecture; Logic synthesis; Physical design; Algorithm-based fault tolerance (ABFT); Error detection by duplicated instructions (EDDI); Parity; Flip-flop hardening; Layout design through error-aware transistor positioning dual interlocked storage cell (LEAP-DICE); Cost-effective; Place-and-route; Field programmable gate array (FPGA) emulation; Application specific integrated circuit (ASIC); Field programmable gate array (FPGA); Energy; Area; Latency
…25
25
28
29
CHAPTER 5 PRE-SILICON DEBUG: HYBRID TRACING
5.1 Comparison to Software… …Service Pack, a minor software update
SP&R
Synthesis, Place, and Route
SRAM
Static Random… …hardware is hard.1 A system designer chooses a custom hardware
design when a pure software… …microprocessor-based software platforms have slowed down, pushing more
and more system designers to… …synthesis, is
one such approach. HLS provides a bridge from the high-productivity software…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Campbell, K. A. (2017). Robust and reliable hardware accelerator design through high-level synthesis. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/99294
Chicago Manual of Style (16th Edition):
Campbell, Keith A. “Robust and reliable hardware accelerator design through high-level synthesis.” 2017. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed March 01, 2021.
http://hdl.handle.net/2142/99294.
MLA Handbook (7th Edition):
Campbell, Keith A. “Robust and reliable hardware accelerator design through high-level synthesis.” 2017. Web. 01 Mar 2021.
Vancouver:
Campbell KA. Robust and reliable hardware accelerator design through high-level synthesis. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2017. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/2142/99294.
Council of Science Editors:
Campbell KA. Robust and reliable hardware accelerator design through high-level synthesis. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2017. Available from: http://hdl.handle.net/2142/99294
.