Support Legacy

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 33774 Experts worldwide ranked by ideXlab platform

Arnaud De La Fortelle - One of the best experts on this subject based on the ideXlab platform.

  • ITSC - Priority-based coordination of autonomous and Legacy vehicles at intersection
    17th International IEEE Conference on Intelligent Transportation Systems (ITSC), 2014
    Co-Authors: Xiangjun Qian, Fabien Moutarde, Jean Gregoire, Arnaud De La Fortelle
    Abstract:

    Recently, researchers have proposed various intersection management techniques that enable autonomous vehicles to cross the intersection without traffic lights or stop signs. In particular, a priority-based coordination system with provable collision-free and deadlock-free features has been presented. In this paper, we extend the priority-based approach to Support Legacy vehicles without compromising above-mentioned features. We make the hypothesis that Legacy vehicles are able to keep a safe distance from their leading vehicles. Then we explore some special configurations of system that ensures the safe crossing of Legacy vehicles. We implement the extended system in a realistic traffic simulator SUMO. Simulations are performed to demonstrate the safety of the system.

  • Autonomous Intersection Management for Mixed Traffic Flow.
    2014
    Co-Authors: Xiangjun Qian, Fabien Moutarde, Jean Gregoire, Arnaud De La Fortelle
    Abstract:

    Recently, researchers have proposed various autonomous intersection management techniques that enable autonomous vehicles to cross the intersection without traffic lights or stop signs. In particular, a priority-based coordination system with provable collision-free and deadlock-free features has been presented. In this paper, we extend the priority-based approach to Support Legacy vehicles without compromising above-mentioned features. We make the hypothesis that Legacy vehicles are able to keep a safe distance from their leading vehicles. Then we explore some special configurations of system that ensures the safe crossing of Legacy vehicles. We implement the extended system in a realistic traffic simulator SUMO. Simulations are performed to demonstrate the safety and efficiency of the system.

  • Priority-based coordination of autonomous and Legacy vehicles at intersection
    2014 17th IEEE International Conference on Intelligent Transportation Systems ITSC 2014, 2014
    Co-Authors: Xiangjun Qian, Fabien Moutarde, Jean Gregoire, Arnaud De La Fortelle
    Abstract:

    Recently, researchers have proposed various autonomous intersection management techniques that enable autonomous vehicles to cross the intersection without traffic lights or stop signs. In particular, a priority-based coordination system with provable collision-free and deadlock-free features has been presented. In this paper, we extend the priority-based approach to Support Legacy vehicles without compromising above-mentioned features. We make the hypothesis that Legacy vehicles are able to keep a safe distance from their leading vehicles. Then we explore some special configurations of system that ensures the safe crossing of Legacy vehicles. We implement the extended system in a realistic traffic simulator SUMO. Simulations are performed to demonstrate the safety of the system.

Kenichi Matsumoto - One of the best experts on this subject based on the ideXlab platform.

  • Identifying Services in Procedural Programs for Migrating Legacy System to Service Oriented Architecture
    International Journal of Information Systems in The Service Sector, 2011
    Co-Authors: Masahide Nakamur, Hiroshi Igaki, Takahiro Kimura, Kenichi Matsumoto
    Abstract:

    In order to Support Legacy migration to the service-oriented architecture (SOA), this paper presents a pragmatic method that derives candidates of services from procedural programs. In the SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, and (3) coarse granularity for business. Such services are identified from the source code and its data flow diagram (DFD), by analyzing data and control dependencies among processes. Specifically, first the DFD must be obtained with reverse-engineering techniques. For each layer of the DFD, every data flow is classified into three categories. Using the data category and control among procedures, four types of dependency are categorized. Finally, six rules are applied that aggregate mutually dependent processes and extract them as a service. A case study with a liquor shop inventory control system extracts service candidates with various granularities.

  • extracting service candidates from procedural programs based on process dependency analysis
    Asia-Pacific Services Computing Conference, 2009
    Co-Authors: Masahide Nakamura, Hiroshi Igaki, Takahiro Kimura, Kenichi Matsumoto
    Abstract:

    To Support Legacy migration to service-oriented architecture (SOA), this paper presents a method that derives candidates of SOA services from procedural programs. In SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, (3) coarse granularity for business. We identify such services from the source code and its data flow diagram (DFD), by analyzing data and control dependency among processes. Specifically, we first obtain the DFD with reverse-engineering techniques. For each layer of the DFD we classify every data flow into three categories. Using the data category and control among procedures, we characterize four types of dependency. We finally apply six rules that aggregate mutually dependent procedures and extract them as a service. A case study with a liquor shop inventory control system extracts service candidates with various granularity.

  • APSCC - Extracting service candidates from procedural programs based on process dependency analysis
    2009 IEEE Asia-Pacific Services Computing Conference (APSCC), 2009
    Co-Authors: Masahide Nakamura, Hiroshi Igaki, Takahiro Kimura, Kenichi Matsumoto
    Abstract:

    To Support Legacy migration to service-oriented architecture (SOA), this paper presents a method that derives candidates of SOA services from procedural programs. In SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, (3) coarse granularity for business. We identify such services from the source code and its data flow diagram (DFD), by analyzing data and control dependency among processes. Specifically, we first obtain the DFD with reverse-engineering techniques. For each layer of the DFD we classify every data flow into three categories. Using the data category and control among procedures, we characterize four types of dependency. We finally apply six rules that aggregate mutually dependent procedures and extract them as a service. A case study with a liquor shop inventory control system extracts service candidates with various granularity.

Vijay Ganesh - One of the best experts on this subject based on the ideXlab platform.

  • EuroS&P - Reasoning about Probabilistic Defense Mechanisms against Remote Attacks
    2017 IEEE European Symposium on Security and Privacy (EuroS&P), 2017
    Co-Authors: Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh
    Abstract:

    Despite numerous countermeasures proposed by practitioners andresearchers, remote control-flow alteration of programs withmemory-safety vulnerabilities continues to be a realisticthreat. Guaranteeing that complex software is completely free of memory-safety vulnerabilities is extremely expensive. Probabilistic countermeasures that depend on random secret keys are interesting, because they are an inexpensive way to raise the bar for attackers who aim to exploit memory-safety vulnerabilities. Moreover, some countermeasures even Support Legacy systems. However, it is unclear how to quantify and compare the effectiveness of different probabilistic countermeasures or combinations of such countermeasures. In this paper we propose a methodology to rigorously derive security boundsfor probabilistic countermeasures. We argue that by representingsecurity notions in this setting as events in probabilistic games, similarly as done with cryptographic security definitions, concreteand asymptotic guarantees can be obtained against realisticattackers. These guarantees shed light on the effectiveness of singlecountermeasures and their composition and allow practitioners to moreprecisely gauge the risk of an attack.

  • Reasoning about Probabilistic Defense Mechanisms against Remote Attacks
    arXiv: Cryptography and Security, 2017
    Co-Authors: Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh
    Abstract:

    Despite numerous countermeasures proposed by practitioners and researchers, remote control-flow alteration of programs with memory-safety vulnerabilities continues to be a realistic threat. Guaranteeing that complex software is completely free of memory-safety vulnerabilities is extremely expensive. Probabilistic countermeasures that depend on random secret keys are interesting, because they are an inexpensive way to raise the bar for attackers who aim to exploit memory-safety vulnerabilities. Moreover, some countermeasures even Support Legacy systems. However, it is unclear how to quantify and compare the effectiveness of different probabilistic countermeasures or combinations of such countermeasures. In this paper we propose a methodology to rigorously derive security bounds for probabilistic countermeasures. We argue that by representing security notions in this setting as events in probabilistic games, similarly as done with cryptographic security definitions, concrete and asymptotic guarantees can be obtained against realistic attackers. These guarantees shed light on the effectiveness of single countermeasures and their composition and allow practitioners to more precisely gauge the risk of an attack.

Jodi Forlizzi - One of the best experts on this subject based on the ideXlab platform.

  • engaging with death online an analysis of systems that Support Legacy making bereavement and remembrance
    Designing Interactive Systems, 2016
    Co-Authors: Rebecca Gulotta, David Gerritsen, Aisling Kelliher, Jodi Forlizzi
    Abstract:

    Death is an inevitable part of life, but digital systems have been slow to address the complex issues that arise when a person passes away. As digital systems have become an increasingly important part people's lives, so too have these systems begun to play a role in a number of practices related to death, such as Legacy-making, bereavement, and remembrance. In this paper, we conduct a survey of seventy-five digital systems designed to Support these practices. Building on prior work, we analyzed these systems to derive findings that articulate how digital technologies reflect how people think about and engage with death. Based on these findings, we generated strategies designed to help system designers grapple with the complex needs that result from navigating death online.

  • Conference on Designing Interactive Systems - Engaging with Death Online: An Analysis of Systems that Support Legacy-Making, Bereavement, and Remembrance
    Proceedings of the 2016 ACM Conference on Designing Interactive Systems - DIS '16, 2016
    Co-Authors: Rebecca Gulotta, David Gerritsen, Aisling Kelliher, Jodi Forlizzi
    Abstract:

    Death is an inevitable part of life, but digital systems have been slow to address the complex issues that arise when a person passes away. As digital systems have become an increasingly important part people's lives, so too have these systems begun to play a role in a number of practices related to death, such as Legacy-making, bereavement, and remembrance. In this paper, we conduct a survey of seventy-five digital systems designed to Support these practices. Building on prior work, we analyzed these systems to derive findings that articulate how digital technologies reflect how people think about and engage with death. Based on these findings, we generated strategies designed to help system designers grapple with the complex needs that result from navigating death online.

Xiangjun Qian - One of the best experts on this subject based on the ideXlab platform.

  • ITSC - Priority-based coordination of autonomous and Legacy vehicles at intersection
    17th International IEEE Conference on Intelligent Transportation Systems (ITSC), 2014
    Co-Authors: Xiangjun Qian, Fabien Moutarde, Jean Gregoire, Arnaud De La Fortelle
    Abstract:

    Recently, researchers have proposed various intersection management techniques that enable autonomous vehicles to cross the intersection without traffic lights or stop signs. In particular, a priority-based coordination system with provable collision-free and deadlock-free features has been presented. In this paper, we extend the priority-based approach to Support Legacy vehicles without compromising above-mentioned features. We make the hypothesis that Legacy vehicles are able to keep a safe distance from their leading vehicles. Then we explore some special configurations of system that ensures the safe crossing of Legacy vehicles. We implement the extended system in a realistic traffic simulator SUMO. Simulations are performed to demonstrate the safety of the system.

  • Autonomous Intersection Management for Mixed Traffic Flow.
    2014
    Co-Authors: Xiangjun Qian, Fabien Moutarde, Jean Gregoire, Arnaud De La Fortelle
    Abstract:

    Recently, researchers have proposed various autonomous intersection management techniques that enable autonomous vehicles to cross the intersection without traffic lights or stop signs. In particular, a priority-based coordination system with provable collision-free and deadlock-free features has been presented. In this paper, we extend the priority-based approach to Support Legacy vehicles without compromising above-mentioned features. We make the hypothesis that Legacy vehicles are able to keep a safe distance from their leading vehicles. Then we explore some special configurations of system that ensures the safe crossing of Legacy vehicles. We implement the extended system in a realistic traffic simulator SUMO. Simulations are performed to demonstrate the safety and efficiency of the system.

  • Priority-based coordination of autonomous and Legacy vehicles at intersection
    2014 17th IEEE International Conference on Intelligent Transportation Systems ITSC 2014, 2014
    Co-Authors: Xiangjun Qian, Fabien Moutarde, Jean Gregoire, Arnaud De La Fortelle
    Abstract:

    Recently, researchers have proposed various autonomous intersection management techniques that enable autonomous vehicles to cross the intersection without traffic lights or stop signs. In particular, a priority-based coordination system with provable collision-free and deadlock-free features has been presented. In this paper, we extend the priority-based approach to Support Legacy vehicles without compromising above-mentioned features. We make the hypothesis that Legacy vehicles are able to keep a safe distance from their leading vehicles. Then we explore some special configurations of system that ensures the safe crossing of Legacy vehicles. We implement the extended system in a realistic traffic simulator SUMO. Simulations are performed to demonstrate the safety of the system.