Skip to main content

Horizontal Menu

  • Research
    • Areas
    • Projects
    • Publications
    • NSA Center of Academic Excellence
  • Education
    • Prospective Students
    • Summer Program Info
  • Team
  • Sponsors
  • Contact
  • Opportunities

Hamburger Menu

  • Home
  • ISIS Calendar
    • Research Projects
    • Research Areas
    • Publications
    • Internship Program
    • Prospective Students
  • Team
  • Sponsors
  • Contact
  • Opportunities

Breadcrumb

  • Home /
  • Publications
Search by title, author, keywords, etc.

2009

publication

Fault-tolerance for Component-based Systems – An Automated Middleware Specialization Approach

Authored by Sumant Tambe, Akshay Dabholkar, and Aniruddha Gokhale
publication

Digital Control of Multiple Discrete Passive Plants Over Networks

This paper provides a passivity based framework to synthesize lm2-stable digital control networks in which m strictly-output passive controllers can control n−m strictly-output passive plants. The communication between the plants and controllers can tolerate time varying delay and data dropouts. In particular, we introduce a power junction which allows even a single controller (typically designed to control a single plant) to accurately control the output of multiple plants even if the corresponding dynamics of each plant is different. In addition to the power-junction we also introduce a passive downsampler (PDS) and passive upsampler (PUS) in order to further reduce networking traffic. A detailed (soft real-time) set of examples shows the tracking performance of the networked control system.
Authored by Nicholas Kottenstette, Joseph Hall, Xenofon Koutsoukos, Panos Antsaklis, and Janos Sztipanovits
publication

Compositional Specification of Behavioral Semantics for Domain-Specific Modeling Languages

Authored by Kai Chen, Joseph Porter, Janos Sztipanovits, and Sandeep Neema
publication

Raising the Abstraction of Domain-Specific Model Translator Development

Model-based development methodologies are gaining ground as software applications are getting more and more complex while the pressure to decrease time-to-market continually increase. Domain-specific modeling tools that support system analysis, simulation, and automatic code generation can increase productivity. However, most domain-specific model translators are still manually written. This paper presents a technique that automatically generates a domain-specific application programming interface from the same metamodels that are used to define the domain-specific modeling language itself. This facilitates the creation of domain-specific model translators by providing a high-level abstraction hiding all the cumbersome modeling tool-specific implementation details from the developer. The approach is illustrated using the Generic Modeling Environment and the Microsoft .NET C# language.
Authored by Tamas Vajk, Robert Kereskenyi, Tihamer Levendovszky, and Akos Ledeczi
publication

Radio Interferometric Quasi Doppler Bearing Estimation

The paper introduces a novel technique for the bearing estimation of radio sources that can be used for the precise localization and/or tracking of RF tags such as wireless sensor nodes. It is well known that the bearing to a radio source can be estimated by an array of antennas typically arranged in a circular manner. The method is often referred to as Quasi-Doppler measurement. The disadvantage of the existing method is that the receiver is relatively large because of the multiple antennas (typically 8 or 16) and it is computationally intensive to process the high frequency radio signals. Thus, it cannot be done on small, inexpensive radio tags. Instead, we propose to use the array on the transmitter side utilizing as few as three antennas. We use a radio interferometric technique to transform the useful phase information from the high frequency radio signal to a low frequency signal (< 1 kHz) that can be processed on low-cost hardware. Utilizing three anchors nodes with small antenna arrays, any number of low cost wireless nodes with single antennas can be accurately localized.
Authored by Janos Sallai, Peter Volgyesi, and Akos Ledeczi
publication

Optimizing P2P Streaming Throughput under Peer Churning

Authored by Yi Cui, Yanchuan Cao, Liang Dai, and Yuan Xue
publication

Modeling and Analysis of Probabilistic Timed Systems

Probabilistic system models are useful for analyzing systems which operate under the presence of uncertainty. In this paper, we present a proposed technique for verifying certain safety and liveness properties for probabilistic timed automata. The proposed technique is an extension of a technique used to verify stochastic hybrid automata using an approximation with Markov Decision Processes. A case study for CSMA/CD protocol has been used to show case the methodology used in our technique.
Authored by Abhishek Dubey, Derek Riley, and Sherif Abdelwahed
publication

Locality-Awareness in Bit Torrent-like P2P Applications

Authored by Bo Liu, Yi Cui, Yansheng Lu, and Yuan Xue
publication

Lm2-stable digital-control networks for multiple continuous passive plants

Authored by Nicholas Kottenstette and Nikhil Chopra
publication

The ESMoL Modeling Language and Tools for Synthesizing and Simulating Real-Time Embedded Systems

High-confidence embedded real-time designs stretch the demands placed on design and development tools. We will demonstrate the design and testing of an embedded control system built using the ESMoL modeling language and supporting tools. ESMoL adds distributed deployment concepts to Simulink designs, and integrates scheduling analysis as well as platformspecific simulation. The testing system includes a simulated physical plant running in a hardware-in-the-loop configuration with the actual embedded controller.
Authored by Joseph Porter, Zsolt Lattmann, Graham Hemingway, Nagabhushan Mahadevan, Sandeep Neema, Harmon Nine, Nicholas Kottenstette, Peter Volgyesi, Gabor Karsai, and Janos Sztipanovits
publication

CQML: Aspect-oriented Modeling for Modularizing and Weaving QoS Concerns in Component-based Systems

Authored by Sumant Tambe, Akshay Dabholkar, and Aniruddha Gokhale
publication

Rapid Synthesis of Multi-Model Simulations for Computational Experiments in C2

Abstract-Virtual evaluation of complex command and control concepts demands the use of heterogeneous simulation environments. Development challenges include how to integrate multiple simulation platforms with varying semantics and how to integrate simulation models and the complex interactions between them. While existing simulation frameworks may provide many of the required services needed to coordinate among multiple simulation platforms, they lack an overarching integration approach that connects and relates the semantics of heterogeneous domain models and their interactions. This paper outlines some of the challenges encountered in developing a command and control simulation environment and discusses our use of the GME meta-modeling tool-suite to create a model-based integration approach that allows for rapid synthesis of complex HLA-based simulation environments.
Authored by Himanshu Neema, Harmon Nine, Graham Hemingway, Janos Sztipanovits, and Gabor Karsai
publication

PaNeCS: A Modeling Language for Passivity-based Design of Networked Control Systems

The rapidly increasing use of distributed architectures in constructing real-world systems has led to the urgent need for a sound systematic approach in designing networked control systems. Communication delays and other uncertainties complicate the development of these systems. This paper describes a prototype modeling language for the design of networked control systems using passive techniques to decouple the control design from network uncertainties. The modeling language includes an integrated analysis tool to check for passivity and a code generator for simulation in MATLAB/Simulink using the True-Time platform modeling toolbox. The resulting designs are more robust to platform e effects, without costly design verification.
Authored by Emeka Eyisi, Joseph Porter, Joseph Hall, Nicholas Kottenstette, Xenofon Koutsoukos, and Janos Sztipanovits
publication

A State Transfer Framework for Object Oriented Fault-Tolerance

Authored by Friedhelm Wolf, Jaiganesh Balasubramanian, Aniruddha Gokhale, and Douglas Schmidt
publication

Optimal performance for detection systems in wireless passive sensor networks.

Authored by Ashraf Tantawy, Xenofon Kousoukos, and Gautam Biswas
publication

Feedback Thermal Control for Real-time Systems

Thermal control is crucial to real-time systems as excessive processor temperature can cause system failure or unacceptable performance degradation due to hardware throttling. Real-time systems face significant challenges in thermal management as they must avoid processor overheating while still delivering desired real-time performance. Furthermore, many real-time systems must handle a broad range of uncertainties in system and environmental conditions. To address these challenges, this paper presents Thermal Control under Utilization Bound (TCUB), a novel thermal control algorithm specifically designed for real-time systems. TCUB employs a feedback control loop that dynamically controls both processor temperature and CPU utilization through task rate adaptation. Rigorously modeled and designed based on control theory, TCUB can maintain both desired processor temperature and CPU utilization, thereby avoiding processor overheating and maintaining desired real-time performance. A salient feature of TCUB lies in its capability to handle a broad range of uncertainties in terms of processor power consumption, task execution times, ambient temperature, and unexpected thermal faults. The robustness of TCUB makes it particularly suitable for real-time embedded systems that must operate in highly unpredictable and hash environments. The advantages of TCUB have been demonstrated through extensive simulations under a broad range of system and environmental uncertainties. available: http://cse.wustl.edu/Research/Lists/Technical%20Reports/Attachments/867/tcub1.pdf (revised 10/2009)
Authored by Yong Fu, Nicholas Kottenstette, Yingming Chen, Chenyang Lu, Xenofon Koutsoukos, and Hongan Wang
publication

An Experimental Model-Based Rapid Prototyping Environment for High-Confidence Embedded Software

The development of embedded software for highconfidence systems is a challenging task that must be supported by a deep integration of control theoretical and computational aspects. Model-based development of embedded software has been practiced for more than a decade now, but very few integrated approaches have emerged to provide end-to-end support for the process, and integrate platform aspects as well as verification. The paper describes an early version of a model-based prototyping toolchain that provides such support and covers most engineering steps. The toolchain is coupled with a hardware-in-the-loop simulation system, allowing quick experimental evaluation of designs.
Authored by Joseph Porter, Peter Volgyesi, Nicholas Kottenstette, Harmon Nine, Gabor Karsai, and Janos Sztipanovits
publication

Detection using intermittent observations for passive wireless sensors

Authored by Ashraf Tantawy, Xenofon Kousoukos, and Gautam Biswas
publication

Autonomic Self-Healing for MANETs

Self-healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self-healing systems can be used for performance optimization, configuration management, access control management and many other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for some time. We show that if exceptional complexity is converted into self-growing knowledge, (policies in our case), can make up for the initial development cost of building an intelligent system. In this paper, we propose that AHSEN (Autonomic Healing-based Self management Engine) clearly demarcates the logical ambiguities in contemporary designs and shows its performance through empirical results obtained through experiments.
Authored by Junaid Chaudhry, Yonghwan Lee, Ken Pence, and J. Sztipanovits
publication

An Approach to Middleware Specialization for Cyber Physical Systems

Authored by Akshay Dabholkar and Aniruddha Gokhale
publication

Reflex and Healing Architecture for Software Health Management

Authored by Abhishek Dubey, Nagabhushan Mahadevan, and Robert Kereskenyi
publication

Model Based Integration and Experimentation of Information Fusion and C2 Systems

Modern Network Centric Operations drive the complexity of information fusion and command and control (C2) systems. Driving this complexity further is the interplay dynamics of the human element, information systems, and communication networks. The lack of low-cost realistic experimental context limits the testing, evaluation, and further development of fusion systems to small-scale localized experiments. A Model-based Integration and Experimentation Framework is proposed. This framework is built on C2 Wind Tunnel - a robust multi-model simulation framework for integrating simulations to drive fusion experiments. The second component of the framework is a model-based system of systems integration tool-suite that allows modeling, synthesis, and deployment of networked system of systems. This component enables researchers to embed their research algorithm into the networked C2 systems. The C2 Wind Tunnel has been used to execute several simulation-driven C2 Experiments.
Authored by Sandeep Neema, Ted Bapty, Xenofon Koutsoukos, Himanshu Neema, Janos Sztipanovits, and Gabor Karsai
publication

Minimum Disruption Service Composition and Recovery in Mobile Ad Hoc Networks

Authored by Shanshan Jiang, Yuan Xue, and Douglas Schmidt
publication

A Passivity-Based Framework for Resilient Cyber Physical Systems

Resilient control systems play a special role in the area of cyber-physical systems, where the design must address the question how complex dynamic plants are to be controlled safely and reliably when a control system is under a cyber attack. In this paper we describe a control theoretical framework based on the concept of passivity for designing a control network which can tolerate, for instance, denial-of-service attacks on networks used in the closed loop. In particular, we demonstrate how the resilient power junction structure could be applied, and provide simulated results.
Authored by Nicholas Kottenstette, Gabor Karsai, and Janos Sztipanovits
publication

Optimal Wireless Network Restoration Under Jamming Attack

Authored by Shanshan Jiang and Yuan Xue

Pagination

  • First page « First
  • Previous page ‹‹
  • …
  • Page 19
  • Page 20
  • Page 21
  • Page 22
  • Current page 23
  • Page 24
  • Page 25
  • Page 26
  • Page 27
  • …
  • Next page ››
  • Last page Last »
Download CSV

Footer Links A

  • About Us
  • Contact
  • LinkedIn

Footer Links B

  • Work at the Institute
  • Summer Program Info

1025 16th Avenue South

Nashville, Tennessee 37212

Phone: (615) 343-7472

Email: contact.isis at vanderbilt dot edu