SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Da Silva Fariña Antonio) "

Sökning: WFRF:(Da Silva Fariña Antonio)

  • Resultat 1-18 av 18
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Hudson, Lawrence N, et al. (författare)
  • The database of the PREDICTS (Projecting Responses of Ecological Diversity In Changing Terrestrial Systems) project
  • 2017
  • Ingår i: Ecology and Evolution. - : John Wiley & Sons. - 2045-7758. ; 7:1, s. 145-188
  • Tidskriftsartikel (refereegranskat)abstract
    • The PREDICTS project-Projecting Responses of Ecological Diversity In Changing Terrestrial Systems (www.predicts.org.uk)-has collated from published studies a large, reasonably representative database of comparable samples of biodiversity from multiple sites that differ in the nature or intensity of human impacts relating to land use. We have used this evidence base to develop global and regional statistical models of how local biodiversity responds to these measures. We describe and make freely available this 2016 release of the database, containing more than 3.2 million records sampled at over 26,000 locations and representing over 47,000 species. We outline how the database can help in answering a range of questions in ecology and conservation biology. To our knowledge, this is the largest and most geographically and taxonomically representative database of spatial comparisons of biodiversity that has been collated to date; it will be useful to researchers and international efforts wishing to model and understand the global status of biodiversity.
  •  
2.
  •  
3.
  • Da Silva Fariña, Antonio, et al. (författare)
  • Design and implementation of a Java Fault Injector for Exhaustif SWIFI tool
  • 2009
  • Ingår i: Proceedings of 2009 4th International Conference on Dependability of Computer Systems, DepCos-RELCOMEX 2009. - 9780769536743 ; , s. 77-83
  • Konferensbidrag (refereegranskat)abstract
    • Java is a successful programming environment and its use has grown from little embedded applications until enterprise network servers based on J2EE. This intensive use of Java demands the validation of their fault tolerance mechanisms to avoid unexpected behavior of the applications at runtime. This paper describes the design and implementation of a fault injector for the "Exhaustif®" SWIFI tool. Aspecific fault model for java applications that include class corruption/substitution at loading time, method call interception and unexpected exception thrown is proposed. The injector uses the JVMTI (JavaVirtual Machine Tool Interface) to perform bytecode instrumentation at runtime to carry out the fault model previously defined. Finally a XML formalization of the specific Java fault model is proposed. This approach, JVMTI + XML fault model description, provides complete independency between the system under test and the fault injection tool, as well the interoperability with another SWIFI tools.
  •  
4.
  •  
5.
  • Da Silva Fariña, Antonio, et al. (författare)
  • Exhaustif : a fault injection tool for distributed heterogeneous embedded systems
  • 2007
  • Ingår i: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a17-
  • Konferensbidrag (refereegranskat)abstract
    • This paper presents Exhaustif®, a SWIFI fault injection tool for fault tolerance verification and the validation of embedded software in distributedheterogeneous systems. Exhaustif® mainly consists of two parts: EEM and FIK. Exhaustif® Executive Manager (EEM) is a GUI Java application to define the fault injection campaign that uses a SQL database to save the test results obtained from the System under Test (SUT) in order to carry out a post injection data analysis. FIK is under the command of EEM to cary out fault injections in applications running under diverse operating systems using pure SWIFI techniques. Exhaustif® carries out floating point register and memory corruptions using temporary triggers and uses an optimized routine interception mechanism to cany out argument and return value corruption with a minimal time overhead. Two experimentalFault Injector Kernels (FIK) under the RTEMS operating system for an EADS-Astrium SPARC ERC32-based MCM processor board and i386 standard PC mainboard have been developed.
  •  
6.
  •  
7.
  •  
8.
  • Da Silva Fariña, Antonio, et al. (författare)
  • XML Schema Based Fault-Set Definition to Improve Fault Injection Tools Interoperability
  • 2010
  • Ingår i: International Journal of Critical Computer-Based Systems. - : InderScience Publishers. - 1757-8779 .- 1757-8787. ; 1:1-3, s. 220-237
  • Tidskriftsartikel (refereegranskat)abstract
    • Software implemented fault injection tools (SWIFI) use fault injectors to carry out the fault injection campaign defined in a GUI-based application. However, the communication between the fault injector and the application is defined in an ad-hoc manner. This paper describes an XML schema formalisation approach for the definition of fault sets which specify low level memory and/or register value corruptions in embedded microprocessor-based systems and resource usage faults in host based systems. Through this proposed XML schema definition, different injectors could be used to carry out the same fault set injection. To validate this approach an experimental tool called Exhaustif®, consisting of a GUI Java application for defining the fault sets and injection policies, one injector for Windows hosts systems and two injectors for Sparc and i386 architectures under RTEMS have been developed. 
  •  
9.
  • Hernández, Vicente, et al. (författare)
  • Security framework for dpws compliant devices
  • 2009
  • Ingår i: 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES. - 9781424443086 ; , s. 87-92
  • Konferensbidrag (refereegranskat)
  •  
10.
  •  
11.
  • Lopez, Lourdes, et al. (författare)
  • ASA : advanced secure architecture for preventing unauthorized access in personal computer platforms and BIOS
  • 2007
  • Ingår i: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM. - 9781595935984 ; , s. Article number a18-
  • Konferensbidrag (refereegranskat)abstract
    • This paper proposes an architecture for Personal Computers (PC) to avoid BIOS alteration and unauthorized access to resources. This proposal is based on results obtained from study of most popular PC platforms security mechanisms. Authentication controls which are established in PC platform in order to grant operating system booting or BIOS integrity of code mechanism incorporated to secureand avoid executing disallowed code are quite easy to break. The architecture described in the present work (Advanced Secure Architecture - ASA) increase the overall information and system security since prevents an unauthorized platform booting and it provides procedures for BIOS code authentication. On the other hand, ASA overcomes the users' authentication challenge in a corporative environment as well as it offers a very flexible way to specify the Personal Computers Corporation set that a user is allowed to access.
  •  
12.
  •  
13.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • An approach for applying multi-agent technology into wireless sensor networks
  • 2007
  • Ingår i: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a22-
  • Konferensbidrag (refereegranskat)abstract
    • The present work describes how the concepts and foundations defined for multi-agent system technology can be applied in to a Wireless SensorNetwork (WSN), specifically it is focused on how multi-agent system technology's mechanisms and implementations could facilitate the development of systems based on WSN. In this respect, an architectural model where the above mentioned concepts, foundations and mechanisms come together is proposed, in order to define applications and services on WSN. Validation of the proposed architecture is made by means of its use in a perimeter security scenario ("tracking"). It is important to mention, that partial results of this work have been developed in the project PROPSI (Perimeter Protection by means of Wireless Sensor Networks).
  •  
14.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • Guaranteeing QoS in Wireless Sensor Networks
  • 2008
  • Ingår i: Wireless Quality of Service. - : Auerbach Publications. - 9781420051308 ; , s. 251-289
  • Bokkapitel (refereegranskat)
  •  
15.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • Pervasive surveillance-agent system based on wireless sensor networks : design and deployment
  • 2010
  • Ingår i: Measurement science and technology. - : Institute of Physics Publishing (IOPP). - 0957-0233 .- 1361-6501. ; 21:12, s. Article number 124005-
  • Tidskriftsartikel (refereegranskat)abstract
    • Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment.
  •  
16.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • QoS in wireless sensor networks : survey and approach
  • 2007
  • Ingår i: Euro American Conference on Telematics and Information Systems - Proceedings of the 2007 Euro American Conference on Telematics and Information Systems, EATIS 2007. - New York, NY, USA : ACM Press. - 9781595935984 ; , s. Article number a20-
  • Konferensbidrag (refereegranskat)abstract
    • A wireless sensor network (WSN) is a computer wireless network composed of spatially distributed and autonomous tiny nodes - smart dustsensors, motes -, which cooperatively monitor physical or environmental conditions. Nowadays these kinds of networks support a wide range of applications, such as target tracking, security, environmental control, habitat monitoring, source detection, source localization, vehicular and traffic monitoring, health monitoring, building and industrial monitoring, etc. Many of these applications have strong requirements for end-to-end delay and losses during data transmissions. In this work we have classified the main mechanisms that have been proposed to provide Quality of Service (QoS) in WSN at Medium Access Control (MAC) and network layers. Finally, taking into account some particularities of the studied MAC- andnetwork-layer protocols, we have selected a real application scenario in order to show how to choose an appropriate approach for guaranteeing performance in a WSN deployed application.
  •  
17.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • Trade-off between performance and energy consumption in wireless sensor networks
  • 2007
  • Ingår i: Self-Organizing Systems. - Berlin, Heidelberg : Springer Berlin/Heidelberg. - 9783540749165 ; , s. 264-271
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • Nowadays WSNs support applications such as target tracking, environmental control or vehicles traffic monitoring. Generally, these applications have strong and strict requirements for end-to-end delaying and loosing during data transmissions. In this paper, we propose a practical scenario for application of the WSN field in order to illustrate selection of an appropriate approach for guaranteeing performance in a WSN-deployed application. The methodology we have used includes four major phases: 1) Requirements analysis of the application scenario; 2) QoS modelling in different layers of the communications protocol stack and selection of more suitable QoS protocols and mechanisms; 3) Definition of a simulation model based on an application scenario, to which we applied the protocols and mechanisms selected in phase 2; 4) Validation of decisions by means of simulation; and 5) analysis of results. This work has being partially developed in the framework of the CRISAL - M0700204174 project (partially funded by “Universidad Politécnica de Madrid” and “Comunidad de Madrid”, Spain).
  •  
18.
  • Martínez-Ortega, José-Fernán, et al. (författare)
  • Wireless sensor networks in knowledge management
  • 2010
  • Ingår i: Procedia Computer Science. - : Elsevier BV. - 1877-0509. ; 1:1, s. 2291-2300
  • Tidskriftsartikel (refereegranskat)abstract
    • Research in Wireless Sensor Networks (WSN) necessarily touches on many research topics of Computer Science, Electronic Engineering and Telecommunication, basing on the existing work in related fields. However, the peculiarity of the WSN field is the interplay and integration of these foundation subjects, yielding a distinct topic worthy of further study in its own right. One of the main open issues in WSN research is to abstract the applications of complex low-level mechanisms, and one of the most powerful and flexible ways to achieve this is creating a Middleware layer that cover all this functionality, provide services to applications, allows the intercommunication among components, adapts dynamically to different operation modes and clearly differentiated from low-level components. Knowledgemanagement and ontologies are also helpful when WSN are used to monitoring and taking decisions. We deploy a WSN in a testing scenario in order to control environmental parameters according to user profile stored in the system.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-18 av 18
Typ av publikation
konferensbidrag (11)
tidskriftsartikel (5)
bokkapitel (2)
Typ av innehåll
refereegranskat (16)
övrigt vetenskapligt/konstnärligt (2)
Författare/redaktör
Hylander, Kristoffer (1)
Granjon, Laurent (1)
Abrahamczyk, Stefan (1)
Jonsell, Mats (1)
Brunet, Jörg (1)
Kolb, Annette (1)
visa fler...
Sáfián, Szabolcs (1)
Persson, Anna S. (1)
Franzén, Markus (1)
Jung, Martin (1)
Nilsson, Sven G (1)
Berg, Åke (1)
Entling, Martin H. (1)
Goulson, Dave (1)
Herzog, Felix (1)
Knop, Eva (1)
Tscharntke, Teja (1)
Aizen, Marcelo A. (1)
Petanidou, Theodora (1)
Stout, Jane C. (1)
Woodcock, Ben A. (1)
Poveda, Katja (1)
Alignier, Audrey (1)
Batáry, Péter (1)
Krauss, Jochen (1)
Steffan-Dewenter, In ... (1)
Westphal, Catrin (1)
Wolters, Volkmar (1)
Edenius, Lars (1)
Rader, Romina (1)
Medina, Nagore G. (1)
Baeten, Lander (1)
Dynesius, Mats (1)
de Sassi, Claudio (1)
Luskin, Matthew S. (1)
Slade, Eleanor M. (1)
Mikusinski, Grzegorz (1)
Gilbert, Benjamin (1)
Felton, Annika (1)
Samnegård, Ulrika (1)
Barlow, Jos (1)
Ficetola, Gentile F. (1)
Yu, Douglas W. (1)
Schweiger, Oliver (1)
Sadler, Jonathan P. (1)
Stefanescu, Constant ... (1)
Måren, Inger E. (1)
Purvis, Andy (1)
Richardson, Michael ... (1)
Hayward, Matt W. (1)
visa färre...
Lärosäte
Mälardalens universitet (17)
Umeå universitet (1)
Stockholms universitet (1)
Lunds universitet (1)
Linnéuniversitetet (1)
Sveriges Lantbruksuniversitet (1)
Språk
Engelska (13)
Spanska (5)
Forskningsämne (UKÄ/SCB)
Teknik (8)
Naturvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy