Publications personnelle

194documents trouvés

08439
01/07/2008

Experimental evaluation of ubiquitous systems. Why and how to reduce WiFi communication range

M.O.KILLIJIAN, D.POWELL, M.ROY, G.SEVERAC

TSF, 2I

Manifestation avec acte : 2nd International Conference on Distributed Event-Based Systems (DEBS 2008), Rome (Italie), 1-4 Juillet 2008, 2p. , N° 08439

Diffusable

114900
08286
17/06/2008

Fine-grained authorization for internet applications

V.NICOMETTE, D.POWELL, Y.DESWARTE, N.ABGHOUR, C.ZANON

TSF, Université Hassan II, 2I

Rapport LAAS N°08286, Juin 2008, 32p.

Diffusable

114025
08339
01/05/2008

Online safety monitoring using safety modes

J.GUIOCHET, D.POWELL, E.BAUDIN, J.P.BLANQUART

TSF, ASTRIUM

Manifestation avec acte : The Sixth IARP-IEEE/RAS-EURON Joint Workshop on Technical Challenges for Dependable Robots in Human Environments, Pasadena (USA), 17-18 Mai 2008, 13p. , N° 08339

Lien : http://hal.archives-ouvertes.fr/hal-00282444/fr/

Diffusable

Plus d'informations

Abstract

Robotic systems have to carry out more and more complex tasks, including ones where humans can be endangered. Residual design faults in such systems, as well as the inevitability of physical faults and interac- tion faults during operation, motivate the use of safety monitors to prevent catastrophic failures. In this paper, we consider the design of such safety monitors for multi- functional robotic systems. We present an approach and a formalization of the process for determining safety rules. It consists in identifying safety modes, according to the different tasks carried out by the monitored system. In practice, each safety mode is related to one or several functional modes and is specied by a permissiveness vector that denes the authorized domains of variation of key physical variables. The set of safety modes can be partially ordered according to their authorization vectors and can thus be represented as a directed acyclic graph. This graph is used to automatically build a model representing safety modes and their transitions, which can be implemented in an independent safety monitor. A case study has been carried out on a mobile manipulator robot, working in a factory alongside humans.

Mots-Clés / Keywords
Dependability; Safety; Online monitoring; Robot; Autonomy;

114380
08032
29/01/2008

Application of the evaluation framework to the complete scenario (preliminary version). Deliverble n° D4.2.1

P.LOLLINI, A.BONDAVALLI, A.CECCARELLI, L.COURTES, L.FALAI, J.GRONBAEK, O.HAMOUDA, M.KAANICHE, M.O.KILLIJIAN, M.KOVACS, I.MAJZIK, E.V.MATTHIESEN, A.NICKELSEN, L.MONTECCHI, J.J.NIELSEN, D.POWELL, T.RENIER

UNIFI, TSF, BME Hungary, AAU Danemark, AAU

Rapport de Contrat : HIDENETS, Project IST-FP6-STREP-26979, Janvier 2008, 107p. , N° 08032

Diffusable

112771
07530
01/12/2007

Dependability evaluation of cooperative backup strategies for mobile devices

L.COURTES, O.HAMOUDA, M.KAANICHE, M.O.KILLIJIAN, D.POWELL

TSF

Manifestation avec acte : 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), Melbourne (Australie), 17-19 Décembre 2007, pp.139-146 , N° 07530

Diffusable

Plus d'informations

Mots-Clés / Keywords
Mobile ad hoc networks; data backup; Markov chains; GSPNs; Dependability evaluation;

112457
07710
01/12/2007

Independent safety systems for autonomy. State of the art and future directions

E.BAUDIN, J.P.BLANQUART, J.GUIOCHET, D.POWELL

TSF, ASTRIUM

Rapport LAAS N°07710, Décembre 2007, 45p.

Diffusable

112486
07697
01/12/2007

MoSAIC: mobile system availability integrity and confidentiality - Final progress report

M.O.KILLIJIAN, M.BANATRE, C.BRYCE, L.BLAIN, P.COUDERC, L.COURTES, Y.DESWARTE, D.MARTIN-GUILLEREZ, R.MOLVA, N.OUALHA, D.POWELL, Y.ROUDIER, I.SILVAIN

TSF, IRISA, 2I, EURECOM

Rapport de Contrat : ACI Sécurité & Informatique 2004, projet n° 04588, MoSAIC, Décembre 2007, 100p. , N° 07697

Diffusable

112454
07296
01/09/2007

Planning with diversified models for fault-tolerant robots

B.LUSSIER, M.GALLIEN, J.GUIOCHET, F.INGRAND, M.O.KILLIJIAN, D.POWELL

TSF, RIS

Manifestation avec acte : International Conference on Automated Planning and Scheduling (ICAPS 2007), Providence (USA), 22-26 Septembre 2007, pp.216-223 , N° 07296

Diffusable

Plus d'informations

Abstract

Autonomous robots offer alluring perspectives in numerous application domains: space rovers, satellites, medical assistants, tour guides, etc. However, a severe lack of trust in their dependability greatly reduces their possible usage. In particular, autonomous systems make extensive use of decisional mechanisms that are able to take complex and adaptative decisions, but are very hard to validate. This paper proposes a fault tolerance approach for decisional planning components, which are almost mandatory in complex autonomous systems. The proposed mechanisms focus on development faults in planning models and heuristics, through the use of diversification. The paper presents an implementation of these mechanisms on an existing autonomous robot architecture, and evaluates their impact on performance and reliability through the use of fault injection.

112174
07082
01/09/2007

Security rationale for a cooperative backup service for mobile devices

L.COURTES, M.O.KILLIJIAN, D.POWELL

TSF

Manifestation avec acte : 3rd Latin-American Symposium on Dependable Computing, Morelia (Mexique), 26-28 Septembre 2007, pp.212-230 , N° 07082

Diffusable

Plus d'informations

Abstract

Mobile devices (e.g., laptops, PDAs, cell phones) are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. This paper discusses security considerations that arise in the design of a cooperative backup service for mobile devices. Participating devices leverage encounters with other devices to temporarily replicate critical data. Anyone is free to participate in the cooperative service, without requiring any prior trust relationship with other participants. In this paper, we identify security threats relevant in this context as well as possible solutions and discuss how they map to low-level security requirements related to identity and trust establishment. We propose self-organized, policy-neutral mechanisms that allow the secure designation and identification of participating devices. We show that they can serve as a building block for a wide range of cooperation policies that address most of the security threats we are concerned with. We conclude on future directions.

Mots-Clés / Keywords
Mobile services; data backup; Security; Dependability;

111605
07056
15/06/2007

Sécurité, protection de la vie privée et disponibilité

Y.DESWARTE, D.POWELL, Y.ROUDIER

TSF, EURECOM

Ouvrage (contribution) : ARAGO 31. Informatique Diffuse, OFTA, Paris, N°ISBN 2-906028-17-7, 2007, Chapitre XII, pp.301-344 , N° 07056

Diffusion restreinte

110441
Pour recevoir une copie des documents, contacter doc@laas.fr en mentionnant le n° de rapport LAAS et votre adresse postale. Signalez tout problème de fonctionnement à sysadmin@laas.fr. http://www.laas.fr/pulman/pulman-isens/web/app.php/