176 results found
Spina A, Breza M, Dulay N, et al., 2020, XPC: fast and reliable synchronous transmission protocols for 2-phase commit and 3-phase commit, The 2020 International Conference on Embedded Wireless Systems and Networks, Publisher: ACM
The improvement of software abstractions and frame-works for programmers is one of the major challenges forthe engineering of reliable and efficient wireless sensing sys-tems. We address this challenge with X Process Commit(XPC), an atomic commit protocol framework, andHybrid,a Synchronous Transmission (ST) communication approach.Hybridexploits the reliability of Glossy and the speed ofChaos, two Synchronous Transmission primitives, to getlower latency and higher reliability than either on their own.Hybridis a general approach that can provide reliable com-munication for any round based protocol. We use XPC andHybridto build the classical 2-phase and 3-phase commitprotocols. Through extensive experimentation, we comparethe performance of the 2-phase and 3-phase commit proto-cols when they useHybrid, Glossy, and Chaos for commu-nication. Our results show thatHybridis more robust thanChaos to radio interference, with almost 100% reliability in anetwork of nodes suffering from moderate radio interference,13% to 50% faster than Glossy, and has comparable over-heads to other state of the art ST atomic commit approachesA2/Synchrotron.
Leahy F, Dulay N, 2018, DejaVu: visual diffing of cyber-physical systems, International Conference on Embedded Wireless Systems and Networks 2018, Publisher: ACM, Pages: 1-2
In this paper we present DejaVu, a novel 3D virtual worldco-simulator for ‘visual diffing’ of cyber-physical systemdeployments in indoor and outdoor environments. Usingfaster-than-real-time simulation and efficient recording DejaVucan record days of simulation data, including environmental,sensor and network data for later replay and analysis.DejaVu enables developers to replay and visually comparemultiple simulations simultaneously using different visualdiffing techniques, including ghosts, paths, colour andsize, highlighting differences between runs, including energyconsumption, radio metrics, movement, etc. We demonstrateseveral of these visual diffing techniques in an CPSenhancedevacuation case study.
Dulay N, Micheletti M, Mostarda L, et al., 2018, PICO-MP: De-centralised macro-programming for wireless sensor and actuator networks, 32nd IEEE International Conference on Advanced Information Networking and Applications, Publisher: IEEE, ISSN: 2332-5658
Macro-programming advocates the use of high-levelabstractions to specify distributed systems as a whole. However,macro-programming implementations are often centralised. Inthis paper we present PICO-MP, the first fully decentralisedmacro-programming middleware for wireless sensor and actuatornetwork (WSAN) applications. PICO-MP incorporates a novelpublish-subscribe service that can correlate events scatteredacross a WSAN using global formulae specifications that areautomatically checked in a distributed fashion. PICO-MP hasbeen implemented for the TinyOS operating system and validatedon a case study that uses global formulae to improve energyefficiency (lifetime) of the implementation.
Leahy F, Dulay N, 2017, Poster abstract: DejaVu - visual diffing of cyber physical systems
In this abstract we present DejaVu, a 3D virtual world co-simulator for’visual diffing’ of cyber-physical system deployments in indoor and outdoor environments. Using faster-than-real-time simulation and efficient recording DejaVu can record days of simulation data, including environmental, sensor and network data for later replay and analysis. DejaVu enables developers to replay and visually compare multiple simulations simultaneously using different visual diffing techniques, including ghosts, paths, colour and size, highlighting differences between runs, including energy consumption, radio metrics, movement, etc. We demonstrate several of these visual diffing techniques in an CPS-enhanced evacuation case study.
Leahy F, Dulay N, 2017, Ardan: Using 3D Game Engines in Cyber-Physical Simulations (Tool Paper), Publisher: SPRINGER INTERNATIONAL PUBLISHING AG, Pages: 61-70, ISSN: 0302-9743
Pediaditakis D, 2015, HomeShaper: Regulating the use of Bandwidth Resources in Home Networks
Bucchiarone A, Dulay N, Lavygina A, et al., 2015, An approach for collective adaptation in socio-technical systems, SASOW 2015, Publisher: IEEE, Pages: 43-48
Socio-technical systems are systems where autonomous humans and computational entities collectively collaborate with each other to satisfy their goals in a dynamic environment. To be resilient, such systems need to adapt to unexpected human behaviours and exogenous changes in the environment. In this paper, we describe a framework for the development of social-technical systems where adaptation is itself a collective process driven by the awareness of capabilities, goals, constraints and preferences of humans and entities, and knowledge of the environment. The adaptation is controlled by a multi-criteria decision making function combined with an analytic hierarchic process (AHP). We present our approach, the collective adaptation algorithm, and its application to a smart mobility scenario.
Lavygina A, Russo A, Dulay N, 2015, Integrating Privacy and Safety Criteria into Planning Tasks, 11th International Workshop on Security and Trust Management (STM), Publisher: SPRINGER INT PUBLISHING AG, Pages: 20-36, ISSN: 0302-9743
Lavygina A, Dulay N, Bucchiarone A, et al., 2015, Preface to the first international workshop on business processes in collective adaptive systems, ISBN: 9783319158945
Marinovic S, Dulay N, Sloman MS, 2014, Rumpole - An Introspective Break-glass Access Control Language, ACM Transactions on Information and System Security
Access control policies define what resources can be accessed by which subjects and under which conditions. It is, however, often not possible to anticipate all subjects that should be permitted access and the conditions under which they should be permitted. For example, predicting and correctly encoding all emergency and exceptional situations is impractical. Traditional access control models simply deny all requests that are not permitted, and in doing so may cause unpredictable and unacceptable consequences. To overcome this issue, break-glass access control models permit a subject to override an access control denial, if he accepts a set of obligatory actions and certain override conditions are met. Existing break-glass models are limited in how the override decision is specified. They either grant overrides for a pre-defined set of exceptional situations, or they grant unlimited overrides to selected subjects, and as such they suffer from the difficulty of correctly encoding and predicting all override situations and permissions. To address this, we develop Rumpole, a novel break-glass language that explicitly represents and infers knowledge gaps and knowledge conflicts about the subject’s attributes and the contextual conditions, such as emergencies. For example, a Rumpole policy can distinguish whether or not it is known that an emergency holds. This leads to a more informed decision for an override request, whereas current break-glass languages simply assume that there is no emergency if the evidence for it is missing. To formally define Rumpole, we construct a novel many- valued logic programming language called Beagle. It has a simple syntax similar to that of Datalog, and its semantics is an extension of Fitting’s bilattice-based semantics for logic programs. Beagle is a knowledge non-monotonic langauge, and as such is strictly more expressive than current many-valued logic program- ming languages.
This paper is prompted by the overall question 'what is the most effective way to recognise disruptive smartphone interruptions?'. We design our experiments to answer 3 questions: 'Do users revise what they perceive as disruptive incoming calls as time goes by?', 'How do different types of machine-learners (lazy, eager, evolutionary, ensemble) perform on this task?' and 'Can we restrict the initial amount of data and/or the number of features we need to make predictions without degrading performance?'. We consider these questions using Cambridge University's Device Analyzer dataset. Copyright 2014 ACM.
Smith J, Lavygina A, Ma J, et al., 2014, Learning to recognise disruptive smartphone notifications, 16th International Conference on Human-Computer Interaction with Mobile Devices and Services, Publisher: ACM, Pages: 121-124
Short term studies in controlled environments have shown that user behaviour is consistent enough to predict disruptive smartphone notifications. However, in practice, user behaviour changes over time (concept drift) and individual user preferences need to be considered. There is a lack of research on which methods are best suited for predicting disruptive smartphone notifications longer-term, taking into account varying error costs. In this paper we report on a 16 week field study comparing how well different learners perform at mitigating disruptive incoming phone calls.
Smith J, Dulay N, 2014, RingLearn: Long-term Mitigation of Disruptive Smartphone Interruptions, 12th IEEE International Conference on Pervasive Computing and Communication (PERCOM), Publisher: IEEE, Pages: 27-35, ISSN: 2474-2503
Smith J, Dulay N, Toth MA, et al., 2013, Exploring Concept Drift using Interactive Simulations, IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), Publisher: IEEE, Pages: 49-54, ISSN: 2474-2503
Pediaditakis D, Gopalan A, Dulay N, et al., 2012, Home network management policies: Putting the user in the loop, Pages: 9-16
Home networks are becoming increasingly complex but existing management solutions are not simple to use since they are not tailored to the needs of typical home-users. In this paper we present a new approach to home network management that allows users to formulate quite sophisticated "comic-strip" policies using an attractive iPad application. The policies are based on the management wishes of home users elicited in a user study. Comic-strip policies are passed to a Policy engine running on a new Home Network Router designed to facilitate a variety of management tasks. We illustrate our approach via a number end-to-end experiments in an actual home deployment, using our prototype implementation. © 2012 IEEE.
Asmare E, Gopalan A, Sloman M, et al., 2012, Self-Management Framework for Mobile Autonomous Systems, Journal of Network and Systems Management, Vol: 20, Pages: 244-275
The advent of mobile and ubiquitous systems has enabled the de- velopment of autonomous systems such as wireless-sensors for environmental data collection and teams of collaborating Unmanned Autonomous Vehicles (UAVs) used in missions unsuitable for humans. However, with these range of new application-domains come a new challenge – enabling self-management in mobile autonomous systems. Autonomous systems have to be able to manage themselves individually as well as to form self-managing teams which are able to recover or adapt to failures, protect themselves from attacks and optimise performance.This paper proposes a novel distributed policy-based framework that en- ables autonomous systems of varying scale to perform self-management indi- vidually and as a team. The framework allows missions to be specified in terms of roles in an adaptable and reusable way, enables dynamic and secure team formation with a utility-based approach for optimal role assignment, caters for communication link maintenance amongst team-members and recovery from failure. Adaptive management is achieved by employing a policy-based archi- tecture to enable dynamic modification of the management strategy relating to resources, role behaviour, communications and team management, without interrupting the basic software within the system.Evaluation of the framework shows that it is scalable with respect to the number of roles, and consequently the number of autonomous systems par- ticipating in the mission. It is also shown to be optimal with respect to role assignments, and robust to intermittent communication link disconnections and permanent team-member failures.
Pediaditakis D, Gopalan A, Dulay N, et al., 2012, A Configuration Service for Home Networks, IEEE Network Operations and Management Symposium (NOMS 2012): Mini-Conference, Pages: 1048-1053
Pediaditakis D, Dulay N, 2011, Verifying home network bandwidth sharing plans
Experimental evidence from recent measurement studies has shown that bandwidth bottlenecks usually reside at the edges of the Internet, which is also true for residential networks where users share network resources and there is a need to regulate the usage of bandwidth. In this paper we introduce a rule-based approach for specifying bandwidth sharing plans for home networks which are enforced in a distributed manner across the network. More specifically we focus on the problem of verifying these sharing plans detecting potential inconsistencies which may arise from the rules that are specified by users. We describe a novel tree-based structure to model and verify the network's sharing scheme and support the specification of custom conflict resolution policies. © 2011 IFIP.
Dong C, Dulay N, 2011, Argumentation-based fault diagnosis for home networks, Pages: 37-42
Home networks are a fast growing market but managing them is a difficult task, and diagnosing faults is even more challenging. Current fault management tools provide comprehensive information about the network and the devices but it is left to the user to interpret and reason about the data and experiment in order to find the cause of a problem. Home users may not have motivation or time to learn the required skills. Furthermore current tools adopt a closed approach which hardcodes a knowledge base, making them hard to update and extend. This paper proposes an open fault management framework for home networks, whose goal is to simplify network troubleshooting for non-expert users. The framework is based on assumption-based argumentation that is an AI technique for knowledge representation and reasoning. With the underlying argumentation theory, we can easily capture and model the diagnosis procedures of network administrators. The framework is rule-based and extensible, allowing new rules to be added into the knowledge base and diagnostic strategies to be updated on the fly.The framework can also utilise external knowledge and make distributed diagnosis. Copyright 2011 ACM.
Sventek J, Koliousis A, Sharma O, et al., 2011, An Information Plane Architecture Supporting Home Network Management, IEEE International Symposium on Integrated Network Management (IM 2011), Pages: 1-8
Home networks have evolved to become small-scale versions of enterprise networks. The tools for visualizing and managing such networks are primitive and continue to require networked systems expertise on the part of the home user. As a result, non-expert home users must manually manage non- obvious aspects of the network ‐ e.g., MAC address filtering, network masks, and firewall rules, using these primitive tools.The Homework information plane architecture uses stream da- tabase concepts to generate derived events from streams of raw events. This supports a variety of visualization and monitoring techniques, and also enables construction of a closed-loop, policy-based management system. This paper describes the information plane architecture and its associated policy-based management infrastructure. Exemplar visualization and closed-loop management applications enabled by the resulting system (tuned to the skills of non-expert home users) are discussed.
Russello G, Mostarda L, Dulay N, 2011, A policy-based publish/subscribe middleware for sense-and-react applications, JOURNAL OF SYSTEMS AND SOFTWARE, Vol: 84, Pages: 638-654, ISSN: 0164-1212
Dong C, Dulay N, 2011, Longitude: A privacy-preserving location sharing protocol for mobile applications, Pages: 133-148, ISSN: 1868-4238
Location sharing services are becoming increasingly popular. Although many location sharing services allow users to set up privacy policies to control who can access their location, the use made by service providers remains a source of concern. Ideally, location sharing providers and middleware should not be able to access users' location data without their consent. In this paper, we propose a new location sharing protocol called Longitude that eases privacy concerns by making it possible to share a user's location data blindly and allowing the user to control who can access her location, when and to what degree of precision. The underlying cryptographic algorithms are designed for GPS-enabled mobile phones. We describe and evaluate our implementation for the Nexus One Android mobile phone. © 2011 International Federation for Information Processing.
Marinovic S, Craven R, Ma J, et al., 2011, Rumpole: a flexible break-glass access control model, New York, NY, USA, SACMAT 2011, Publisher: ACM, Pages: 73-82
Dong C, Russello G, Dulay N, 2011, Shared and searchable encrypted data for untrusted servers., Journal of Computer Security, Vol: 19, Pages: 367-397, ISSN: 0926-227X
Russello G, Scalavino E, Dulay N, et al., 2010, Coordinating data usage control in loosely-connected networks, Pages: 30-39
In a disaster-recovery mission, rescuers need to coordinate their operations and exchange information to make the right judgments and perform their statutory duties. The information exchanged may be privileged or sensitive and not generally in the public domain. For instance, the assessment of the risk level in the disaster area where a chemical plant is located requires data about the nature of the potential chemical hazards and the probability of an hazardous event to occur. Such data may contain information that could be of value to a rival company and may generate chaos if released to the public. Retaining control of data that is shared between organisations can be achieved by deploying Enterprise Rights Management (ERM) systems. However, ERM systems rely on centralised authorities that must be contacted by client applications to obtain access rights. Such centralised solutions are not practical in a disaster scenario where communication infrastructure may have been damaged by the event making very difficult to establish reliable wide-are communications. In this paper, we propose a solution for the enforcement of usage control policies that leverage on the data dissemination model of Opportunistic Networks (oppnets). Our solution, named xDUCON, relies on the data abstraction of the Shared Data Space (SDS). Data and usage control policies are represented as tuples that are disseminated across the available SDSs connected through the oppnets. © 2010 IEEE.
Twidle K, Marinovic S, Dulay N, 2010, Teleo-reactive policies in Ponder2, Pages: 57-60
Policies could potentially be an important and cost-effective technique for building and managing pervasive systems. Historically, policy-based systems have been built using a policy environment that supports the specification and enforcement of policies for a range of management concerns such as adaptation and security. In this short paper we describe our experiences with challenges in building human-centric pervasive systems. As a result of these experiences we introduce a novel management policy type based on teleo-reactive procedures that replace traditional ECA management policies. © 2010 IEEE.
Marinovic S, Twidle K, Dulay N, 2010, Teleo-Reactive workflows for pervasive healthcare, Pages: 316-321
There is growing interest in using workflows to describe, monitor and direct a wide-range of medical procedures in hospitals. Unlike their well-established business counterparts, medical workflows require a high degree of execution flexibility since it is impossible to anticipate all the possible circumstances that might influence their execution and it is important that staff are permitted to respond to situations flexibly. Medical workflows also need to be unobtrusive, since requiring staff to continually acknowledge task execution or enter workflow data will get in the way of delivering medical healthcare. In this paper we present a new approach to workflow specification based on Teleo-Reactive programs, where a workflow is not defined as a set of discrete steps, but rather as a goal-driven process. Workflow tasks are modelled as continuous context conditions or durative actions. TR workflows offer a high degree of flexibility and an easier way to model human-centric tasks than the traditional graphbased workflow models. We illustrate the approach with a small pervasive heaIthcare example and show how we also apply the approach to managing workflow resources and security. © 2010 IEEE.
Mostarda L, Sykes D, Dulay N, 2010, A state machine-based approach for reliable adaptive distributed systems, Pages: 91-100
Adaptive systems are often composed of distributed components that co-operate in order to achieve a global behaviour, and yet many approaches for adaptive systems are centralised or make strong assumptions about the distributed aspects of the problem. However, if insufficient attention is paid to the problem of decentralisation, especially in the difficult and unpredictable environments in which adaptive systems are commonly deployed, it can introduce inefficiencies, and even cause catastrophic failure. An adaptive system is either required to implement subtle synchronisation and consensus protocols or accept certain types of failure from which the system cannot recover. A major goal of our research is to facilitate the development of adaptive, reliable and distributed applications.We provide a framework in which a state machine language is used to define logically centralised behaviour. This is automatically translated into a reliable and efficient distributed implementation that enforces the correct co-ordination in the presence of unpredictable failures. © 2010 IEEE.
Dong C, Dulay N, 2010, Shinren: Non-monotonic Trust Management for Distributed Systems, 4th IFIP WG 11 11 International Conference on Trust Management, Publisher: SPRINGER-VERLAG BERLIN, Pages: 125-140, ISSN: 1868-4238
Choujaa D, Dulay N, 2010, Predicting Human Behaviour from Selected Mobile Phone Data Points, 12th International Conference on Ubiquitous Computing, Publisher: ASSOC COMPUTING MACHINERY, Pages: 105-108
This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.